Install this root certificate to get trusted HTTPS for
*.roman and *.tower services over Tailscale.
This is the public certificate only. It cannot be used to sign anything without the private key, which never leaves the server.
Chrome and Vivaldi on Linux use their own certificate database (NSS), not the system trust store. You must add the cert here or these browsers won't trust it.
curl -o roman-ca.crt https://cert.imfucked.lol/roman-ca.crt
certutil if you don't have it:# Debian / Ubuntu
sudo apt install libnss3-tools
# Arch / Manjaro
sudo pacman -S nss
# Fedora / RHEL
sudo dnf install nss-tools
certutil -d sql:$HOME/.pki/nssdb -A -t "C,," -n "Roman CA" -i roman-ca.crt
https://any-service.roman.certutil -d sql:$HOME/.pki/nssdb -D -n "Roman CA"
Adds the cert for curl, wget, and other tools that use the system CA
bundle. Does not affect Chrome, Vivaldi, or Firefox.
# Debian / Ubuntu
sudo cp roman-ca.crt /usr/local/share/ca-certificates/roman-ca.crt
sudo update-ca-certificates
# Arch / Manjaro
sudo cp roman-ca.crt /etc/ca-certificates/trust-source/anchors/roman-ca.crt
sudo update-ca-trust
# Fedora / RHEL
sudo cp roman-ca.crt /etc/pki/ca-trust/source/anchors/roman-ca.crt
sudo update-ca-trust
Firefox uses its own certificate store. See the Firefox tab.
roman-ca.crt to open the Certificate Import Wizard.certutil -addstore "Root" roman-ca.crt
Firefox ignores the Windows cert store by default. See the Firefox tab.
roman-ca.crt file.
Chrome trusts user-installed CAs on Android. After installing the cert above, Chrome will show a
green lock for *.roman and *.tower with no extra config needed.
Tell Firefox to trust OS-level certificates. This means you only install the cert once per OS.
about:config in Firefox.security.enterprise_roots.enabled.true.roman-ca.crt.