mirror of
https://github.com/acme-dns/acme-dns.git
synced 2026-04-27 12:55:48 +03:00
[GH-ISSUE #338] Register endpoint with configurable subdomain #186
Labels
No labels
Documentation
Documentation
bug
enhancement
feature request
feature request
help wanted
pull-request
question
security
security
testing
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/acme-dns#186
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @datafoo on GitHub (Apr 24, 2023).
Original GitHub issue: https://github.com/acme-dns/acme-dns/issues/338
I am interested in using
acme-dnsbut I am wondering something. What are reasons foracme-dnsto choose the subdomain itself?I see an opportunity to automate things even more if I could choose the subdomain myself, in advance.
@aduzsardi commented on GitHub (Apr 25, 2023):
depending on where you host your DNS zone , you can already do that with some tooling
when you request an acme-dns record , that record will be echoed out ... which you can then parse and further use in your tooling with API calls to your DNS hosting provider and Let's Encrypt or other acme CA
i think having the subdomain be defined manually by human intervention is just asking for trouble
@datafoo commented on GitHub (Apr 25, 2023):
The point of ACME-DNS is to be able to automate renewal of TLS certificates with DNS-01 challenges securely: without storing a high-privilege API token on the server that needs the TLS certificates (see article from EFF: https://www.eff.org/deeplinks/2018/02/technical-deep-dive-securing-automation-acme-dns-challenge-validation).
If the DNS hosting provider is already providing a API token with restricted-permission (update of a given TXT record only), then I do not need ACME-DNS.
If the DNS hosting provider is providing me with a high-privilege API token, then I am back with the problem that ACME-DNS was trying to solve initially.
So I do not understand how the solution you propose brings any value.
What would those trouble be?
@robalexdev commented on GitHub (May 23, 2023):
Certificate issuance and subdomain registration are already separate. When and how you perform those steps depends on the ACME client. Is there a particular ACME client you're using?
On the first run, LEGO's acme-dns provider will call
/registerto get a subdomain and will save the credentials to a file (seeACME_DNS_STORAGE_PATH). Then it prompts you to manually set the CNAME. You could instead call/registeryourself (using curl, for example), set up the CNAME, and create that file manually. This causes LEGO to skip the registration process, since you're providing an existing subdomain, and issue a certificate right away. I'm doing this in one of my projects to pre-register subdomains.acme-dns doesn't need any changes to support this, although your ACME client may. I may be able to point you in the right direction.
Presumably name collisions and ownership issues. If you're picking a subdomain name without checking if it's already been assigned then someone else may already own it. If you set up the CNAME then someone else can issue certificates for your domain. Even if you try to use an unguessable UUID, an attacker can look at your DNS records to see the dangling CNAME, then try to register the subdomain before you can.
The only way to do this safely is to register the subdomain with acme-dns before you set the CNAME. This way you know that no one else has credentials for the subdomain. Since you need to call
/registerfirst, you may as well let acme-dns pick the subdomain name for you. Then it's just a matter of configuring your ACME client.