Skip to content

AsaTyr2018/DomNexDomain

Repository files navigation

DomNexDomain

DomNexDomain

From lean reverse proxy to full edge control plane for secure self-hosting.

DomNexDomain started as a focused routing layer.
It has evolved into an integrated edge platform that combines routing, DNS and certificate automation, threat-aware policy enforcement, observability, and day-2 operations in one Linux-native service.

Product Positioning

DomNexDomain is a self-hosted Edge Control Plane:

  • expose internal services safely
  • enforce security posture at the edge
  • operate everything from one UI/API
  • keep runtime simple (single Go binary, systemd-first)

Connectivity Prerequisite

DomNexDomain is the gatekeeper, not the connectivity provider.

It assumes your edge is reachable from the internet on the intended entry points. Provider constraints (CGNAT, IPv6-only edge gaps, tunnel strategy) are currently out of product scope and tracked separately in roadmap guidance (P11).

Why DomNexDomain

  • Integrated edge stack: reverse proxy, DNS automation, ACME, authn/authz, threat controls, metrics, logs.
  • Security-first flow: Threat Intel + WAF baseline + geo policy + traceable edge error handling.
  • Operational clarity: Strategic Intel unifies events, telemetry, geo, and investigations for fast operator workflows.
  • Resilience after WAN drops: automatic public-IP reconciliation and Cloudflare DNS self-heal.
  • Linux-native runtime: statically linked Go binary, systemd deployment, no Node.js requirement in production.
  • Pragmatic persistence: SQLite + encrypted secrets for v1 simplicity.

Core Capabilities

  • Host-based HTTP/HTTPS routing with WebSocket and HTTP/2 support
  • Optional HA per subdomain (failover / round-robin)
  • SSH Bastion gateway mode
  • Automated DNS + certificate workflows (Cloudflare-first)
  • Automated WAN-IP drift handling with Cloudflare reconciliation
  • 1-minute DNS maintenance loop for apex + subdomain reachability transitions
  • In-house MFA/2FA (TOTP) with per-role enforcement and recovery flow
  • Login hardening with staged auth flow and anti-enumeration behavior
  • Smart branded edge error pages with trace ID correlation
  • Threat Intel modes (Monitor only / Auto mode) with allowlist-first policy
  • Edge hard-drop enforcement for hard-blocked sources
  • GeoIP multi-source ingestion (.mmdb, .csv, .gz, .zip) with compiled source-of-truth MMDB
  • GeoIP source stats and upload progress in Web UI
  • Role model: admin, domain-admin, read-only
  • Scoped API tokens (global/domain/system)
  • Data retention controls + daily purge jobs
  • Encrypted backup/restore pipeline with scheduled jobs and post-restore checks
  • Audit events for resilience operations (network.public_ip.changed.auto, maintenance.reachability.changed, maintenance.cloudflare.domain_updated)
  • Setup Assistant with OTS unlock and restore-first onboarding
  • UI style profiles (Monolith, CyberMonolith, Custom)

Built For

  • security-focused homelabs
  • small infra teams and operators
  • self-hosters who want fewer moving parts than stitching Nginx/Caddy + scripts + extra tooling

Documentation

Detailed setup and operations are maintained in the wiki:

For appliance-style onboarding:

sudo ./deploy/systemd/setup-appliance.sh

Operating Profiles

  • Quickstart Gate (default): strong baseline with minimal friction
  • Warden Gate (hardening): stricter security posture for exposed production edges

Profile guidance is documented in the wiki.

Compliance Notice

  • IP addresses are treated as operational security data and are subject to retention limits.
  • DomNexDomain does not automatically ensure legal compliance. Operators remain responsible for lawful use.

Support

Screenshots

grafik grafik grafik grafik

About

All-in-one edge control plane for secure, production-ready public self-hosting.

Resources

License

Code of conduct

Stars

Watchers

Forks

Contributors

Languages