1
0
Fork 0
mirror of https://github.com/zyberzero/certbot-rfc2136.git synced 2024-11-23 07:41:11 +01:00

initial commit

This commit is contained in:
Fritiof Hedman 2017-08-29 11:44:58 +00:00
commit 835980f5d0
3 changed files with 47 additions and 0 deletions

25
README.md Normal file
View file

@ -0,0 +1,25 @@
#Using certbot (Let's encrypt) with RFC2136
Some servers are unable to have a web server installed, but can still make use of a certificate (for example, mail servers).
These scripts automates the authentication and clean up using DNS for validation.
##Installation
clone this repo, or download the files.
Update the files with the data necessary, such as zone name, name server and path to your key-file.
Your server needs nsupdate, which at least on debian is in the bind9utils package. You also need to create a keypair that you use for validate that you have the right to update the zone data.
Create your key by using `dnssec-keygen`, for example:
`$ dnssec-keygen -a HMAC-MD5 -b 512 -n USER keyname`
This will create to files, a .private, and a .key file. Upload the key file to your DNS administrator, or set up bind as per below. The .private file is, as the name implies, supposed to be private as anyone with that file can update your DNS zone. This is also the file that you should point out by the scripts.
Then, setup certbot;
```sudo certbot certonly --preferred-challenges=dns --manual --manual-auth-hook /usr/sbin/certbot-auth.sh --manual-cleanup-hook /usr/sbin/certbot-clean.sh -d yourdomain.tld --manual-public-ip-logging-ok```
It will then verify your domain, and then download the certificate. Afterwards, `sudo certbot renew` will update the certificate. Use a renew hook if you want to do something after renewal, such as reloading postfix, or whatever service that uses the certificates.
##BIND installation
I'm running BIND on my DNS servers, and followed [this guide] (http://linux.yyz.us/dns/ddns-server.html) to set it up.

11
certbot-auth.sh Executable file
View file

@ -0,0 +1,11 @@
#!/usr/bin/env bash
set -e
set -u
set -o pipefail
NSUPDATE="nsupdate -k /path/to/private"
DNSSERVER="masterns.yourdomain.tld"
ZONE="yourzonename.tld"
TTL=300
printf "server %s\nzone %s.\nupdate add _acme-challenge.%s. %d in TXT \"%s\"\nsend\n" "${DNSSERVER}" "${ZONE}" "${CERTBOT_DOMAIN}" "${TTL}" "${CERTBOT_VALIDATION}" | $NSUPDATE

11
certbot-clean.sh Executable file
View file

@ -0,0 +1,11 @@
#!/usr/bin/env bash
set -e
set -u
set -o pipefail
NSUPDATE="nsupdate -k /path/to/private"
DNSSERVER="masterns.yourdomain.tld"
ZONE="yourzonename.tld"
TTL=300
printf "server %s\nzone %s.\nupdate delete _acme-challenge.%s. %d in TXT \"%s\"\nsend\n" "${DNSSERVER}" "${ZONE}" "${CERTBOT_DOMAIN}" "${TTL}" "${CERTBOT_VALIDATION}" | $NSUPDATE