Great work! Public CAs have done a wonderful job making HTTPS easy for public websites, but private networks feel under-supported and we're often stuck with legacy tools. I'm really happy to see people building here.<p>I've been working on getlocalcert[1] which explores this problem from the other end; how can we make TLS certificate management and trust root distribution easier? There's lots of interest in using certificates issued by public CAs for private domains. Especially the free ones from Let's Encrypt. This completely avoids trust root distribution challenges and concerns about trust roots being used to MITM traffic. My local DNS management story is admittedly currently a hand-wave[2], but I really like your approach. I was hoping we could pair our tools, but I think mDNS is for .local only, so we won't be compatible.<p>I'm curious about the trust root you're using. Lots of tools will create these without any nameConstraints, which is reasonable as client-side support has historically been poor[3], but restricting the root <i>and</i> any intermediaries to *.local can reduce the risk that a stolen trust root is used to MITM unrelated sites like google.com.<p>[1] <a href="https://www.getlocalcert.net/" rel="nofollow noreferrer">https://www.getlocalcert.net/</a><p>[2] <a href="https://docs.getlocalcert.net/dns/" rel="nofollow noreferrer">https://docs.getlocalcert.net/dns/</a><p>[3] <a href="https://alexsci.com/blog/name-non-constraint/" rel="nofollow noreferrer">https://alexsci.com/blog/name-non-constraint/</a>