mirror of
https://github.com/acme-dns/acme-dns.git
synced 2026-04-27 12:55:48 +03:00
[GH-ISSUE #211] clarification questions #95
Labels
No labels
Documentation
Documentation
bug
enhancement
feature request
feature request
help wanted
pull-request
question
security
security
testing
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/acme-dns#95
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @dresske on GitHub (Feb 27, 2020).
Original GitHub issue: https://github.com/acme-dns/acme-dns/issues/211
Hi,
I'm interested a lot in testing this project. My primary DNS provider doesn't support API calls. That's why I want to use this approach for LE certificates. Before getting started some short questions from my side:
old version
auth.example.com NS ns1.auth.example.comcurrent version
auth.example.org NS auth.example.comWas there any change? I have to ask the primary DNS admins to create the NS record. Want to be sure in the first place.
https://github.com/joohoi/acme-dns/issues/97
https://github.com/gridworkz/kubernetes/wiki/Acme-DNS-Server
https://wiki.nethserver.org/doku.php?id=userguide:let_s_encrypt_acme-dns
From my point of view everything should by modified under auth.example.com and not the level above or is this a missunderstanding? Because the level above has no API support.
Maybe the most general question:
Thanks in advance for hints and comments :-)
@webprofusion-chrisc commented on GitHub (Feb 27, 2020):
Hi, the DNS server configuration for the acme-dns server just affects your acme-dns servers own domain (e.g. auth.domain.com coming via domain.com).
Your acme-dns service itself can be used to validate any domain. The CNAME you are asked to create in _acme-challenge.anydomain.com in turn redirects to blah12346.auth.domain.com which then responds with the correct TXT value requires for your current validation.
@dresske commented on GitHub (Feb 28, 2020):
Hi Chris,
thanks for your quick reply! And this cname to the generated subdomain (blah12346.auth.domain.com) is constant/stable for all renewals, right?
The only question left is this point with the "shortened" NS delegate record I have to set in my primary DNS to give acme-dns control over its subdomain
auth.example.com NS ns1.auth.example.comns1.auth.example.com A $EXTERNAL_IPversus
auth.example.com NS auth.example.comauth.example.com A $EXTERNAL_IPIs there any advantage or downside doing one or the other?
Many thanks in advance!
@webprofusion-chrisc commented on GitHub (Feb 28, 2020):
I think the naming convention (ns1.) is just that and technically it still works but it implies the different roles. One is the API server for ACME and the other is the DNS server but really they're the same software just doing different jobs on different ports.
Yes the CNAME value stays stable, you'd only need to change it if your acme server lost its database (which holds those names and corresponding TXT response values), or if your acme server domain changed.
@dresske commented on GitHub (Feb 28, 2020):
Thanks Chris!
...I had a typo in my question above. I will try to set up short version like it is descibed at the current readme
adns.mydomain.tld NS adns.mydomain.tldadns.mydomain.tld A $EXTERNAL_IP@AvverbioPronome commented on GitHub (Mar 20, 2020):
I suppose the proper short way it to add, in the
example.com.zone, something like this:The A record there is known as a "glue record" -- it's not supposed to be there, but it's necessary to reach the authoritative nameserver for zone
auth.example.com.