mirror of
https://github.com/acme-dns/acme-dns.git
synced 2026-04-27 12:55:48 +03:00
[GH-ISSUE #159] Question: Same cert across multiple servers? #58
Labels
No labels
Documentation
Documentation
bug
enhancement
feature request
feature request
help wanted
pull-request
question
security
security
testing
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/acme-dns#58
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @Daniel15 on GitHub (Mar 14, 2019).
Original GitHub issue: https://github.com/acme-dns/acme-dns/issues/159
Say I need a certificate for
*.example.comon three separate servers. Which approach would be preferable?rsyncor scp/sftp)@joohoi commented on GitHub (Mar 14, 2019):
The first option would be preferable. It makes the configuration much less flaky.
rsyncing things around and handling restarts and such has too many possibilities for errors.@webprofusion-chrisc commented on GitHub (Mar 14, 2019):
This is a little off-topic for acme-dns but I'm actually working on this problem just now for https://github.com/webprofusion/certify - renew once and deploy to many targets (including remote/sftp/ssh). Yes, it raises a lot of interesting questions!
The benefit of centralised renewal is that it's simpler to track if you have/have not renewed the cert itself and you can perform the renewal work on behalf of servers/devices that can't/shouldn't renew for themselves. It's a natural problem related to wildcards, once you have one it may need to be applied to a large number of things, and you may not actually control all of those things.