Skip to main content

Using Dragonfly With TLS

If you deploy Dragonfly over an endpoint that's connected to the internet, you probably need to protect your data from leaking or being intercepted. In order to support that, dragonfly can serve your data over TLS, an ISO standardized protocol that provides encryption and authentication.

In this tutorial we'll show how easy it is to configure Dragonfly to use TLS! To get a valid TLS certificate, we're going to assume that you have a shell open on an Ubuntu server and a DNS address that points to this server. This DNS address will then be used to server our datastore.

Getting a certificate

We'll provision a TLS certificate using a python program called certbot that was made by Let's Encrypt. Let's use it!

  1. Install python and nginx: sudo apt install -y nginx-light python3 python3-venv libaugeas0
  2. Create a virtual environment and install certbot:
$ python3 -m venv certbot
$ certbot/bin/pip install certbot certbot-nginx
  1. Now run certbot as root: sudo ./certbot/bin/certbot You'll have to enter the URL that we want to use and points to the server, in our case

If all went well, the private key and the certificate are now located in /etc/letsencrypt/live/.

Running Dragonfly

Choose a password for authenticating users to the datastore:

export DFLY_PASSWORD=<???>

We can now start Dragonfly on our server with TLS enabled:

$ sudo ./dragonfly \
--tls \
--tls_key_file=/etc/letsencrypt/live/ \
--tls_cert_file=/etc/letsencrypt/live/ \

And connect to see that the datastore is working:

$ redis-cli --tls -h -a ${DFLY_PASSWORD}> set anchdrite 33.7
OK> set pallasite 19.1
OK> get anchdrite

Client Authentication with TLS

Instead of using passwords, Client Certificates can also be used to authenticate clients. Since you'll be managing the certificates in this case, you won't need to use Let's Encrypt. Assuming you have the required certificates, you can configure dragonfly to require client certificates like this:

$ sudo ./dragonfly \
--tls \
--tls_key_file=/etc/mycerts/server_key.pem \
--tls_cert_file=/etc/mycerts/server_cert.pem \

And connect with a client certificate like this:

redis-cli --tls -h \
--key /etc/mycerts/client_priv.pem
--cert /etc/mycerts/client_cert.pem

In this case, client_cert.pem will need to be signed by the root that is trusted by the server, clients_root_ca.pem.