All Projects → adferrand → Dnsrobocert

adferrand / Dnsrobocert

Licence: mit
Orchestrate Certbot and Lexicon together to provide Let's Encrypt TLS certificates validated by DNS challenges

Programming Languages

python
139335 projects - #7 most used programming language

Projects that are alternatives of or similar to Dnsrobocert

django-yadpt-starter
Yet Another Django Project Template skeleton for Django projects
Stars: ✭ 28 (-93.33%)
Mutual labels:  letsencrypt, ssl-certificate, certbot
docker-haproxy-certbot
Dockerized HAProxy with Let's Encrypt certificates automatic renewal
Stars: ✭ 28 (-93.33%)
Mutual labels:  letsencrypt, ssl, certbot
Docker Letsencrypt Certgen
Docker image to generate, renew, revoke RSA and/or ECDSA SSL certificates from LetsEncrypt CA using certbot and acme.sh clients in automated fashion
Stars: ✭ 64 (-84.76%)
Mutual labels:  ssl, letsencrypt, certbot
Ansible Role Certbot
Ansible Role - Certbot (for Let's Encrypt)
Stars: ✭ 477 (+13.57%)
Mutual labels:  ssl, letsencrypt, certbot
Getaltname
Extract subdomains from SSL certificates in HTTPS sites.
Stars: ✭ 320 (-23.81%)
Mutual labels:  dns, ssl, ssl-certificate
Serverpilot Letsencrypt
Automate the installation of Let's Encrypt SSL on the free plan of ServerPilot
Stars: ✭ 129 (-69.29%)
Mutual labels:  ssl, letsencrypt, certbot
Lua Resty Auto Ssl
On the fly (and free) SSL registration and renewal inside OpenResty/nginx with Let's Encrypt.
Stars: ✭ 1,786 (+325.24%)
Mutual labels:  ssl, letsencrypt, ssl-certificate
Nginxconfig.io
⚙️ NGINX config generator on steroids 💉
Stars: ✭ 14,983 (+3467.38%)
Mutual labels:  ssl, letsencrypt, ssl-certificate
Certbot Letencrypt Wildcardcertificates Alydns Au
certbot'renewing letencrypt certificate plugin - automatic verification aliyun/tencentyun/godaddy dns
Stars: ✭ 839 (+99.76%)
Mutual labels:  dns, letsencrypt, certbot
Certbot Route53
Helping create Let's Encrypt certificates for AWS Route53
Stars: ✭ 159 (-62.14%)
Mutual labels:  ssl, letsencrypt, certbot
certbot-dns-ovh
Certbot plugin to respond to DNS-01 challenges by updating the zone.
Stars: ✭ 20 (-95.24%)
Mutual labels:  dns, letsencrypt, certbot
Lexicon
Manipulate DNS records on various DNS providers in a standardized way.
Stars: ✭ 1,028 (+144.76%)
Mutual labels:  dns, letsencrypt, ssl-certificate
docker-nginx-certbot
Automatically create and renew website certificates for free using the Let's Encrypt certificate authority.
Stars: ✭ 367 (-12.62%)
Mutual labels:  letsencrypt, ssl, certbot
Echo
High performance, minimalist Go web framework
Stars: ✭ 21,297 (+4970.71%)
Mutual labels:  ssl, letsencrypt
cfn-api-gateway-custom-domain
API Gateway custom domains as CloudFormation resources, backed by Let's Encrypt
Stars: ✭ 17 (-95.95%)
Mutual labels:  letsencrypt, ssl
freshcerts
ACME certificate protocol (Let's Encrypt) proxy client with a dashboard and monitoring
Stars: ✭ 59 (-85.95%)
Mutual labels:  letsencrypt, ssl
Excision-Mail
Fullstack, security focused mailserver based on OpenSMTPD for OpenBSD using ansible
Stars: ✭ 108 (-74.29%)
Mutual labels:  letsencrypt, ssl
acm
Automatic wildcard certificate management for Cloudflare and Heroku
Stars: ✭ 40 (-90.48%)
Mutual labels:  letsencrypt, ssl
letsencrypt-www
Probably the easiest way to create | renew | deploy certificate
Stars: ✭ 27 (-93.57%)
Mutual labels:  letsencrypt, ssl
letsencrypt-inwx
A small cli utility for automating the letsencrypt dns-01 challenge for domains hosted by inwx.
Stars: ✭ 43 (-89.76%)
Mutual labels:  letsencrypt, certbot

====== |logo|

|version| |python_support| |docker| |ci| |coverage| |spectrum|

.. |logo| image:: https://adferrand.github.io/dnsrobocert/images/dnsrobocert.svg :alt: DNSroboCert .. |version| image:: https://img.shields.io/pypi/v/dnsrobocert :target: https://pypi.org/project/dnsrobocert/ .. |python_support| image:: https://img.shields.io/pypi/pyversions/dnsrobocert :target: https://pypi.org/project/dnsrobocert/ .. |docker| image:: https://img.shields.io/docker/image-size/adferrand/dnsrobocert :target: https://microbadger.com/images/adferrand/dnsrobocert .. |ci| image:: https://img.shields.io/azure-devops/build/adferrand/338d4cba-ab35-4cf9-a9c6-1d2601554b32/21/master :target: https://dev.azure.com/adferrand/dnsrobocert/_build/latest?definitionId=21&branchName=master .. |coverage| image:: https://img.shields.io/azure-devops/coverage/adferrand/338d4cba-ab35-4cf9-a9c6-1d2601554b32/21 :target: https://dev.azure.com/adferrand/dnsrobocert/_build?definitionId=21&view=ms.vss-pipelineanalytics-web.new-build-definition-pipeline-analytics-view-cardmetrics .. |spectrum| image:: https://withspectrum.github.io/badge/badge.svg :target: https://spectrum.chat/dnsrobocert

.. tag:intro-begin

.. contents:: Table of Contents :local:

Features

DNSroboCert is designed to manage Let's Encrypt_ SSL certificates based on DNS challenges_.

  • Let's Encrypt wildcard and regular certificates generation by Certbot_ using DNS challenges,
  • Integrated automated renewal of almost expired certificates,
  • Standardized API through Lexicon_ library to insert the DNS challenge with various DNS providers,
  • Centralized YAML configuration file to maintain several certificates and several DNS providers with configuration validity control,
  • Modification of container configuration without restart,
  • Flexible hooks upon certificate creation/renewal including containers restart, commands in containers or custom hooks,
  • Support for DNS alias mode_ (see the follow_cnames option in the certificate section_),
  • Linux, Mac OS X and Windows support, with a particular care for Docker services,
  • Delivered as a standalone application and a Docker image.

.. _DNS alias mode: https://github.com/acmesh-official/acme.sh/wiki/DNS-alias-mode .. _certificate section: https://dnsrobocert.readthedocs.io/en/latest/configuration_reference.html#certificate-properties

Why use DNSroboCert

If you are reading these lines, you certainly want to secure all your services using Let's Encrypt SSL certificates, which are free and accepted everywhere.

If you want to secure Web services through HTTPS, there is already plenty of great tools. In the Docker world, one can check Traefik_, or nginx-proxy_ + letsencrypt-nginx-proxy-companion_. Basically, theses tools will allow automated and dynamic generation/renewal of SSL certificates, based on TLS or HTTP challenges, on top of a reverse proxy to encrypt everything through HTTPS.

So far so good, but you may fall in one of the following categories:

  1. You are in a firewalled network, and your HTTP/80 and HTTPS/443 ports are not opened to the outside world.
  2. You want to secure non-Web services (like LDAP, IMAP, POP, etc.) were the HTTPS protocol is of no use.
  3. You want to generate a wildcard certificate, valid for any sub-domain of a given domain.

For the first case, ACME servers need to be able to access your website through HTTP (for HTTP challenges) or HTTPS (for TLS challenges) in order to validate the certificate. With a firewall these two challenges - which are widely used in HTTP proxy approaches - will not be usable: you need to ask a DNS challenge. Please note that traefik embed DNS challenges, but only for few DNS providers.

For the second case, there is no website to use TLS or HTTP challenges, and you should ask a DNS challenge. Of course you could create a "fake" website to validate the domain using a HTTP challenge, and reuse the certificate on the "real" service. But it is a workaround, and you have to implement a logic to propagate the certificate, including during its renewal. Indeed, most of the non-Web services will need to be restarted each time the certificate is renewed.

For the last case, the use of a DNS challenge is mandatory. Then the problems concerning certificates propagation that have been discussed in the second case will also occur.

The solution is a dedicated and specialized tool which handles the creation/renewal of Let's Encrypt certificates, and ensure their propagation in the relevant services. It is the purpose of this project.

.. _Let's Encrypt: https://letsencrypt.org/ .. _DNS challenges: https://tools.ietf.org/html/draft-ietf-acme-acme-01#page-44 .. _Certbot: https://github.com/certbot/certbot .. _Lexicon: https://github.com/AnalogJ/lexicon .. _Traefik: https://hub.docker.com/_/traefik/ .. _nginx-proxy: https://hub.docker.com/r/jwilder/nginx-proxy/ .. _letsencrypt-nginx-proxy-companion: https://hub.docker.com/r/jrcs/letsencrypt-nginx-proxy-companion/

.. tag:intro-end

Documentation

Online documentation (user guide, configuration reference) is available in the DNSroboCert documentation_.

For a quick start, please have a look in particular at the User guide_ and the Lexicon provider configuration_.

Support

Do not hesitate to join the DNSroboCert community on Spectrum_ if you need help to use or develop DNSroboCert!

Contributing

If you want to help in the DNSroboCert development, you are welcome! Please have a look at the Developer guide_ page to know how to start.

.. _DNSroboCert documentation: https://dnsrobocert.readthedocs.io .. _User guide: https://dnsrobocert.readthedocs.io/en/latest/user_guide.html .. _Lexicon provider configuration: https://dnsrobocert.readthedocs.io/en/latest/providers_options.html .. _Developer guide: https://dnsrobocert.readthedocs.io/en/latest/developer_guide.html .. _DNSroboCert community on Spectrum: https://spectrum.chat/dnsrobocert

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].