Hi,
I could not find anything related to this so I hope this could be a possible new feature.
We would like to see the DNS ACME challange in Pritunl Zero. At this moment we need to open up port 80 for the whole world and we cannot apply GeoIP blocking on that port and when we want to implement HSTS it could impact the ACME challenge.
Support for authorizing the Lets Encrypt certificates with DNS challenges on AWS and Oracle Cloud will be added to both Pritunl Zero and Pritunl Cloud soon. This will be added with the secrets storage component that will be used store the AWS and Oracle Cloud API keys.
Support for OracleCloud still needs to be completed. It may be in a build this weekend. It isn’t possible currently to pull the code from the repository, there is still a lot of uncommitted code.
This is now available on the unstable repositories, it will move to the stable repositories after a few days of testing. The DNS provider API key is stored in the secrets tab which can then be selected from the certificates page. Support for AWS, Cloudflare and Oracle Cloud is available.
The web server in Pritunl has a very secure dual layer design, there shouldn’t be any concern with keeping it open to the internet. A lot of configurations will require it to be open. Any vulnerability especially on port 80 which has almost no handlers would very likely need to exist both on the Golang and Python web servers. It doesn’t pass the full request to the inner web server, it is fully parsed with JSON type checking in Golang then recreated using only the defined set of headers and sent to the internal server.
It can be made more secure by running sudo pritunl set app.web_systemd true then sudo systemctl restart pritunl this will isolate it in a systemd service that has a lot of the isolation options configured. This may become the default but to prevent compatibility issues currently it must be manually enabled. There are also SELinux profiles included with the RHEL packages that further protect the web server process.