Skip to content

kyse/letsencrypt-sophosutm-dns

Repository files navigation

letsencrypt-sophosutm-dns

Let's Encrypt ssl cert management via Dehydrated with tsig dns-01 verification and Sophos UTM update hooks.

Disclaimer

USE AT YOUR OWN RISK!

This package is not meant to be used on production servers or by inexperienced users. I assume no liability if something goes wrong while you use this package. I am not responsible for any damages you may incur using these scripts. I suggest you read through the scripts dehydrated, hook.sh, and utm-update-certificate.pl to know what they are doing.

Contents

Description

This package is setup to provide an automated way to keep updated Let's Encrypt ssl certs on your UTM without dealing with SSH key's, SCP file transfers, etc. Everything happens on the UTM and stays on the UTM. It will work well in scenarios where you intend to perform SSL termination at the UTM WAF and intend to use DNS-01 acme-challenge verifications of your domains. Some modifications have been made to Dehydrated and the hooks to ensure things work properly when running in the UTM environment.

Usage

UTM Environment

  • You need to ensure you have the Let's Encrypt intermediate verification CA imported in your UTM. It can be found here.

Setup

  1. SSH into your UTM shell: ssh -l loginuser utm.domain.local
  2. Become root: su, enter root password
  3. Change directory to root home or wherever you intend to host this package: cd ~
  4. Grab the package: wget https://github.com/kyse/letsencrypt-sophosutm-dns/raw/develop/dist/leutmdns.tar.gz
  5. Unzip the package: tar -xzvf leutmdns.tar.gz
  6. Edit ~/leutmdns/config: vi ~/leutmdns/config
    • To start with, ensure you are using the LE staging servers until you've tested everything. Then switch the commeted lines for CA and CA_TERMS.
    • Update CONTACT_EMAIL to your LE account email.
  7. Edit ~/leutmdns/hook.sh: vi ~/leutmdns/hook.sh
    • Update SERVER to your dns tsig update endpoint.
    • If your UTM is behind a split brain DNS, uncomment EXTERNALNS to point to a name server on the outside. This will allow the script to ensure external name servers have received the updated TXT challenge records before asking LE to validate.
  8. Edit ~/leutmdns/domains.txt: vi ~/leutmdns/domains.txt
    • Standard Dehydrated proecdure here... enter primary domain with any additional SAN domains space seperated. 1 line per certificatee.
  9. Create tsig key files in the ~/leutmdns/tsig/ folder.
    • File name format: K_acme-challenge.zone.tld.+157+random.private - zone.tld = your DNS zone your updating, no need for 1 file per FQDN, just the zone being targeted for that FQDN. Random can be anything.
    • File content format (the keyname and secret will come from your DNS provider):
      key "keyname" {
        algorithm hmac-md5;
        secret "secret";
      };
      
  10. Create ref files in the ~/leutmdns/refs/ folder.
    • First, you'll need to ensure you have existing certificates created that you want to target for updates from the LE cert renewals.
      cc
      OBJS
      ca
      host_key_cert
      tab tab (hit it twice to list existing REF_* for each cert).
      exit
      
    • Create a file named after the primary domain (first domein on each line of ~/leutmdns/domains.txt). If your domains.txt file contains domain.com www.domain.com on line 1, and www.domain.net www2.domain.net on line 2:
      cd ~/leutmdns/refs
      echo REF_123456789 >> domain.com
      echo REF_987654321 >> www.domain.net
  11. Register an account.
    • ./dehydrated --register --accept-terms
  12. Run a test!
    • Again ensure you're targeting the staging LE servers.
    • Probably a good idea not to target any active certs in the UTM, so create a fake one to test with.
    • Kick off the proces (in ~/leutmdns folder): ./dehydrated -c
  13. Update domains.txt, REF_ files, and switch staging urls to prod urls in the config file and go live with it.

Automate

TODO: There's bound to be a better way to achieve this. Research and update this section. Also ned to update output, possibly figure out how to get it to email output & errors through the UTM notification system.

  1. Add a link to dehydrated to your bin path: ln -s /root/leutmdns/dehydrated /usr/local/bin/dehydrated
  2. Add a line to the bottom of your /etc/crontab-static file: @monthly root /usr/local/bin/dehydrated -c
  3. Make a change in the UTM web admin site to get the crontab file updated.
    • In web admin site, click the management menu item.
    • Select up2date sub menu item.
    • Select the configuration tab.
    • Change one of the dropdowns to a different value, save, then change back to your desired value and save again.
  4. Confirm /etc/crontab contains the new entry.

Notes

  • UTM uses a customized openssl.cnf file in /etc/ssl that doesn't work well unless provided proper ENV variables. Dehydrated stock script didn't provide the --cert flag during the certificate request which caused openssl to try and load up the UTM openssl.cnf file. I've updated the dehydrated script on line 619 to include the flag to the openssl.cnf file path provided in the ~/leutmdns/config file to resolve.
  • Ensure you have a file for each DNS zone you will be updating using the proper naming scheme in the tsig folder.
  • Ensure you have a file for each certificate named after the domain (the first domain per line/cert in domains.txt file) containing the REF_* to your UTM certificate object.

Dependencies

SubModules

Making use of the following submodule dependencies so as not to reinvent the wheel:

Other Imports

Also directly imported and modified the followng:

Contributing

Development Setup

Download the git repo to your local environment and load the submodules.

git clone --recursive https://github.com/kyse/letsencrypt-sophosutm-dns.git leutmdns

To get a new .tar.gz package built in the dist folder, just run build.sh.

About

Let's Encrypt ssl cert management via Dehydrated with tsig dns-01 verification and Sophos UTM update hooks.

Topics

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Languages