ok - since there was a new update to the plugin I decided to come back to this.
As suggested, I turned off proxy in Cloudflare but it did not work. When I tried to browse to ha.example.com I got a BitDefender pop-up on my host machine saying 'Suspicious page blocked for your protection', and when I tried it in the W11 Sandbox of my host machine (that doesn't run Bitdefender) I got a message saying 'Your connection isn't private' and when I advance beyond that 'This page isn't working right now'.
So I decided to take Cloudflare out of the picture, and try it with Duckdns instead.
I setup duckdns entries for: example.duckdns.org and ha-example.duckdns.org
In Caddy I setup up a domain record for example.duckdns.org and an associated http handler. In the domain I used Certificate ACME (HTTP-1, TLS-ALPN-01), plus checked DNS-01 Challenge and Dynamic DNS. In the Handler I checked TLS Insecure Skip Verify. With this setup I can now browse to example.duckdns.org and get a valid ssl connection to myOPNSense box! Yeah!
I then tried to setup ha-example.duckdns.org in the same way to point to my HomeAssistant box. The only difference was the IP address and the Port in the Handler. However, when I browse to https://ha-example.duckdsn.org:8123 I get ERR_CONNECTION_TIMED_OUT.
Now the scarry part.
Beyond that, and yikes, when I browse to https://ha-example.duckdns.org (no port) or https://ha-example.duckdsn.org:443 I get redirected to a malware site. The same sort of thing happened last week in my testing - but I got directed to survey-smiles (or something like that) (after a few days it was clunen.com/xr.php?e=iqXRc and a bunch of other stuff which I assume amounted to some sort of injection attack ) (both of which Bitdefender was blocking) but now its redirecting to https : //crrds70hubcc73ba0m30.securedjointnetwork.co.in/01/?cid=ac910b88f486f12d .... (asking me to click on some box to prove I'm not a robot which I suspect Bitdefender should be blocking but is not) Of note: in the link above I manually added a space between the s, colon, and slash so this post would not have that show up as a hyperlink.
Originally, I thought perhaps my PC had a virus, but I scanned it and it came up clean. Also, at the time, as I remember it I was getting the same redirect in the W11 sandbox and on a Raspberry pi running Raspberry OS. I am now not getting it in Windows sandbox, nor on the Raspberry Pi OS - but neither of those are connecting to my home assistant box either.
Of note - I do not have a certificate on my home assistant box (a dedicated Raspberry Pi) as I understood Caddy didn't need one to allow the connection to be secure.
A lot to digest for sure.
As suggested, I turned off proxy in Cloudflare but it did not work. When I tried to browse to ha.example.com I got a BitDefender pop-up on my host machine saying 'Suspicious page blocked for your protection', and when I tried it in the W11 Sandbox of my host machine (that doesn't run Bitdefender) I got a message saying 'Your connection isn't private' and when I advance beyond that 'This page isn't working right now'.
So I decided to take Cloudflare out of the picture, and try it with Duckdns instead.
I setup duckdns entries for: example.duckdns.org and ha-example.duckdns.org
In Caddy I setup up a domain record for example.duckdns.org and an associated http handler. In the domain I used Certificate ACME (HTTP-1, TLS-ALPN-01), plus checked DNS-01 Challenge and Dynamic DNS. In the Handler I checked TLS Insecure Skip Verify. With this setup I can now browse to example.duckdns.org and get a valid ssl connection to myOPNSense box! Yeah!
I then tried to setup ha-example.duckdns.org in the same way to point to my HomeAssistant box. The only difference was the IP address and the Port in the Handler. However, when I browse to https://ha-example.duckdsn.org:8123 I get ERR_CONNECTION_TIMED_OUT.
Now the scarry part.
Beyond that, and yikes, when I browse to https://ha-example.duckdns.org (no port) or https://ha-example.duckdsn.org:443 I get redirected to a malware site. The same sort of thing happened last week in my testing - but I got directed to survey-smiles (or something like that) (after a few days it was clunen.com/xr.php?e=iqXRc and a bunch of other stuff which I assume amounted to some sort of injection attack ) (both of which Bitdefender was blocking) but now its redirecting to https : //crrds70hubcc73ba0m30.securedjointnetwork.co.in/01/?cid=ac910b88f486f12d .... (asking me to click on some box to prove I'm not a robot which I suspect Bitdefender should be blocking but is not) Of note: in the link above I manually added a space between the s, colon, and slash so this post would not have that show up as a hyperlink.
Originally, I thought perhaps my PC had a virus, but I scanned it and it came up clean. Also, at the time, as I remember it I was getting the same redirect in the W11 sandbox and on a Raspberry pi running Raspberry OS. I am now not getting it in Windows sandbox, nor on the Raspberry Pi OS - but neither of those are connecting to my home assistant box either.
Of note - I do not have a certificate on my home assistant box (a dedicated Raspberry Pi) as I understood Caddy didn't need one to allow the connection to be secure.
A lot to digest for sure.
"