mirror of
https://github.com/acme-dns/acme-dns.git
synced 2026-04-27 04:45:48 +03:00
[GH-ISSUE #120] Clarification on usage of https://auth.acme-dns.io #47
Labels
No labels
Documentation
Documentation
bug
enhancement
feature request
feature request
help wanted
pull-request
question
security
security
testing
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/acme-dns#47
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @gucki on GitHub (Oct 12, 2018).
Original GitHub issue: https://github.com/acme-dns/acme-dns/issues/120
I couldn't find any information if https://auth.acme-dns.io is official and can be used in production? Or is it just a demo and could go away anytime? Would be great to have this clarified in the readme or at https://www.acme-dns.io. Thank you.
@Ajedi32 commented on GitHub (Oct 12, 2018):
Pretty sure you can use it in production, but if you do you're technically giving the owner of that domain the ability to issue certs for your website.
This is documented in the README:
In the future it might be possible to fix that using ACME CAA extensions with the accounturi parameter, but until that's implemented I'd recommend against using
auth.acme-dns.ioin production.@gucki commented on GitHub (Oct 17, 2018):
Thanks. But this doesn't state who is runningauth.acme-dns.io. If it would be a trustworthy party (letsencrypt itself?) it wouldn't be a problem at all. I wonder why letsencrypt is not running this service on their infrastructure (are they?) so it's not needed to haven dozens of custom installs. Shouldn't cause to much traffic/ costs compared to the signing infrastructure?
@Ajedi32 commented on GitHub (Oct 17, 2018):
Let's Encrypt is just a CA. They don't develop ACME clients or run servers for third-party tools.
I don't know who runs auth.acme-dns.io. Probably @joohoi, I assume.
@joohoi commented on GitHub (Oct 18, 2018):
Yes. I'm running
acme-dns.ioand the statement inREADME.mdstands true. However there is something brewing that would address the trust issue once and for all.validationmethodsextension to CAA, RFC draft of which you can check out. It's not yet deployed to Let's Encrypt production, but it available on staging environment. You can read more about this from Let's Encrypt community forum post.TL;DR: CAA extension allows you to redstrict certificate issuance to a specific ACME account, making it feasible to use third party service for providing the TXT record as the issuance is restricted to your specific local ACME account.
@joohoi commented on GitHub (Oct 18, 2018):
On additional note, I try to discourage people to use
auth.acme-dns.ioin their production and instead host their own because of how the trust mechanism without validationmethods work. However I'm trying to keepauth.acme-dns.ioup and running, and am striving to preserve the existing database might any upstream changes to the software happen.@sserdyuk commented on GitHub (Jun 24, 2019):
@joohoi Thank you for providing
auth.acme-dns.ioin the past as a simple solution for the ones that don't want to run the whole system. I noticed it is not working now. The DNS isn't resolving. Does that mean you've discontinued service and we should migrate?@webprofusion-chrisc commented on GitHub (Jun 25, 2019):
I've been considering offering a low-cost hosted acme-dns option for a while now, mainly to service users of https://certifytheweb.com but it could work for other clients. If auth.acme-dns.io is permanently offline that may become more of a necessity, I'd possibly also be willing to host it depending on the type of costs you're seeing in your current implementation.
@joohoi commented on GitHub (Jun 25, 2019):
auth.acme-dns.iois back up now. It was left offline because of hurried maintenance tasks before midsummer festives (a big thing in Finland). When the CAA extensions draft gets finalized and enforcing of it is turned on for Let's Encrypt, I'm planning on hosting a public instance on a more fault tolerant infrastructure.That said, I'm planning to keep the
auth.acme-dns.iorunning even in its current state regardless.@sserdyuk commented on GitHub (Jun 25, 2019):
Thank you sir
@VuiDJi commented on GitHub (Jan 24, 2023):
@joohoi Thank you for providing auth.acme-dns.io service. However it is not working now (DNS isn't resolving). Can you please tell me if it is planned to resume its operation, and if so, when? Thank you!
@VuiDJi commented on GitHub (Jan 24, 2023):
It works! :)
@mdella-nutanix commented on GitHub (Oct 3, 2023):
So how would you host your own service? or can you basically give the application the DDNS key for the CNAME destination TXT file?