The recent @letsencrypt shutdown of TLS-SNI-01 validation (due to idiotic hosting providers) is very disappointing. It was by far the most convenient, hands-off, universal validation mechanism. https://community.letsencrypt.org/t/2018-01-11-update-regarding-acme-tls-sni-and-shared-hosting-infrastructure/50188 …
-
Show this thread
-
DNS-01 requires making all my DNS zones dynamic, which is a PITA and increases complexity. HTTP-01 requires pre-provisioning site configs and having a mutable webroot. TLS-SNI-01 was great because it didn't clash with actual production configs at all so it always worked.
4 replies 1 retweet 3 likesShow this thread -
The closest thing to the previous hands-off behavior I can think of is using iptables to send port 80 to some other port, and deploying an nginx config that passes that through to port 80 on self except for the well-known ACME paths. But ugh.
1 reply 0 retweets 3 likesShow this thread -
I guess a less ugly method would be to have the default vhost serve the ACME challenges and then having an include to add that functionality in every additional port 80 vhost. Still ugh.
4 replies 0 retweets 1 likeShow this thread -
Replying to @marcan42
That’s what I do: # Within each site config server block: include snippets/letsencrypt.conf; # letsencrypt.conf: location ~ .well-known/acme-challenge/ { root /var/www/letsencrypt; default_type text/plain; }
1 reply 0 retweets 0 likes -
Replying to @C0deH4cker
Yes, this is the plan. But the previous config required zero additional config stanzas (other than the cert itself).
1 reply 0 retweets 0 likes -
Replying to @marcan42
I guess I just don’t see it as a hindrance as you do. I’ve been using letsencrypt this way all along, for every site and nginx server I host
1 reply 0 retweets 0 likes -
Replying to @C0deH4cker
It's not a huge deal but it's not as nice and magical as TLS-SNI-01 which Just Worked.
1 reply 0 retweets 0 likes -
Replying to @marcan42 @C0deH4cker
Ended up requiring some more effort to handle top-level redirects, allow/deny and similar. rewrite ^(/.well-known/acme-challenge/.*) $1 break; location ^~ /.well-known/acme-challenge/ { root /var/www/acme; allow all; default_type text/plain; break; }
1 reply 0 retweets 1 like
certbot configs: for i in *; do echo $i; sed -i s/certbot-external:external/webroot/g $i; (echo webroot_path = /var/www/acme; echo '[[webroot_map]]'; openssl x509 -in ../live/${i%%.conf}/cert.pem -text|tr , '\n'|grep DNS|sed -re 's, *DNS:(.*),\1 = /var/www/acme,') >>$i ; done
-
-
-
- Show replies
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.