mirror of
https://github.com/acme-dns/acme-dns.git
synced 2026-04-27 04:45:48 +03:00
[GH-ISSUE #119] Add Option to Use staging Let'sEncryptServer during setup #46
Labels
No labels
Documentation
Documentation
bug
enhancement
feature request
feature request
help wanted
pull-request
question
security
security
testing
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/acme-dns#46
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @dkhughes on GitHub (Oct 7, 2018).
Original GitHub issue: https://github.com/acme-dns/acme-dns/issues/119
Hi!
Thanks for the great piece of software. During setup, I was trying to figure out my firewall for allowing DNS through properly, and I hit the production requests/hr limit accidentally on Let'sEncrypt servers. It would be nice to be able to change to their staging servers during setup and validation of firewall/ethernet settings. Maybe a config option?
@Ajedi32 commented on GitHub (Oct 8, 2018):
You mean you hit Let's Encrypt's Failed Validation limit while using the autocert feature via the
tls = "letsencrypt"config option?I like the idea of a config option, but I think the better solution to your problem is to just not use
tls = "letsencrypt"until after you're already sure the configured autocert port on your server is accessible from the public internet.@dkhughes commented on GitHub (Oct 8, 2018):
Yes, I hit the 5 tries per hour limit on the production servers.
The problem I ran into is that the documentation was a little confusing for me since the name of the DNS subdomain, and the name of the DNS nameserver are identical and it's never mentioned that auth.example.com is the NS or the subdomain we're authorizing for. My DNS provider (dnsmadeeasy) doesn't allow the nameserver to have the same name as the subdomain. So, I was adjusting those domain values, and the letsencrypt self authentication name trying to watch debug messages when I hit the limit.
Offering the staging server as an IP choice when a newbie (e.g., me) is fudging around a bit is also a request the letsencrypt folks made, and it would be nice to be able to respect their wishes.
Debugging the certbot hook setup was much easier since you can pass the staging option and fix any errors the hook or bot throws, and not feel bad since it's not hitting the production IP.
@Yannik commented on GitHub (Oct 8, 2018):
@dkhughes You do not need to set both a NS record and A/CNAME record at your provider. The A/CNAME is ignored anyway, as it is resolved by your own NS.
Have a look at this
digtrace:@dkhughes commented on GitHub (Oct 8, 2018):
I did notice that when I was watching the queries being resolved.
I think the issue for me was more to do with not knowing what I should put specifically into the different values. The comments weren't clear enough for my experience level with acme-dns. For example, the entry in the config file ('https://github.com/joohoi/acme-dns/blob/master/config.cfg#L32'):
The empty string doesn't provide any help. An example in the comment would be very helpful in knowing that it should point to the public name chosen for your local authentication - I just used the same DNS name (ns0.example.com). When setting it up, I wasn't sure if it was using that value alone or doing an internal combination with the settings that came previously in the config file.
I got there in the end, but it took a few tries which is why I thought it would be nice to be able to specify the staging servers.
@dkhughes commented on GitHub (Oct 8, 2018):
@Yannik Oh, and what I meant about the DNS record at dnsmadeeasy is the NS record is not allowed to have
auth.example.comas the subdomain and the NS record destination. It's not a conflict between the A record and NS, it's in their webgui that blocks that type of entry.@Yannik commented on GitHub (Oct 8, 2018):
@dkhughes Oh, now I got you. IIRC this would also be against a dns rfc. Is there anything in the docs that made you use this specific setup?
@dkhughes commented on GitHub (Oct 8, 2018):
@Yannik No reason other than it was in place already. The change was simple in the config for the NS restriction - the server just got called ns0.auth.example.com. instead of auth.example.com, and then the change propogated through the config file.
acme-dns is the best solution I've come across now for keeping https servers that are on a private subnet with no public http access happy (previously used dehydrated scripts).
@jrkeen commented on GitHub (Oct 11, 2018):
I need a detailed tutorial for cer-manager using acme-dns thanks
@coreyperkins commented on GitHub (Apr 22, 2020):
Is there a workaround for this? I'm using the CertifyTheWeb GUI.
@webprofusion-chrisc commented on GitHub (Apr 24, 2020):
@coreyperkins this issue relates only to the acme-dns server itself (getting it set up and configured to use Let's Encrypt for it's own certificate). For Certify The Web itself supporting for staging (for the certs you generate using it) is coming shortly in v5.