mirror of
https://github.com/acme-dns/acme-dns.git
synced 2026-04-27 12:55:48 +03:00
[GH-ISSUE #318] Acme DNS can issue only 1 subdomain #173
Labels
No labels
Documentation
Documentation
bug
enhancement
feature request
feature request
help wanted
pull-request
question
security
security
testing
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/acme-dns#173
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @b-a-t on GitHub (Oct 10, 2022).
Original GitHub issue: https://github.com/acme-dns/acme-dns/issues/318
I would like to bring attention to the issue described in the
acme.shrepo - https://github.com/acmesh-official/acme.sh/issues/4221In short,
acme-dnsfor whatever reason limits the number of TXT records in the air to two, which creates trouble issuing and renewing certificates with 3 or more SAN records.The mentioned issue provides a workaround for this limitation, but I believe it is better to be fixed in the
acme-dnsitself.This https://github.com/acmesh-official/acme.sh/issues/4221#issuecomment-1207433691 has a more detailed description of the problem:
@kkloesener commented on GitHub (Dec 31, 2023):
Depending on your Use Case there is another solution. This solution makes the world even more secure:
If your server supports SNI don’t use SAN certificates at all and just issue additional certificates to use them.
All current reverse-proxy and load-balancer like Traefik, nginx, Citrix Netscaler, kemp and f5 support this for HTTPS
@TomyLobo commented on GitHub (Dec 8, 2025):
fwiw, here's the culprit:
https://github.com/joohoi/acme-dns/blob/v1.1/db.go#L256
And no, splitting up the certs, like @kkloesener suggests, doesn't help, at least not on its own, and I don't see how it would add any security, since you're still keeping all the certs in the same place.
You have to use separate acme-dns accounts to work around this issue.
Unfortunately, acme.sh doesn't support setting an acme-dns account per hostname.
certbot might be able to do it or not, I haven't looked into it.
So you might still need to split up the certs anyway, in addition to using separate accounts.
cert-manager should be able to do it, but that's rather kubernetes-specific.
It handles all challenges separately and its acme-dns config is keyed by hostname.
So it should work. Should.