Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Make use of "caa-identities" metadata #4836

Open
zjs opened this issue Jun 14, 2017 · 9 comments
Open

Make use of "caa-identities" metadata #4836

zjs opened this issue Jun 14, 2017 · 9 comments

Comments

@zjs
Copy link
Collaborator

zjs commented Jun 14, 2017

If the ACME server exposes a "caa-identities" key in its /directory response's "meta" key, Certbot should expose that to users so that they know what string to use if they wish to configure CAA.

Additionally, if the ACME servers exposes such a key, Certbot could attempt to verify the domain does not have a conflicting CAA record prior to trying to obtain a certificate (to fail fast with a helpful error message).

See also:

@pde
Copy link
Member

pde commented Jun 28, 2017

This would be a good volunteer task if the core team specified what the mechanism of exposure was?

@pde pde added this to the 2.0 milestone Jun 28, 2017
@stale
Copy link

stale bot commented Jun 11, 2019

We've made a lot of changes to Certbot since this issue was opened. If you still have this issue with an up-to-date version of Certbot, can you please add a comment letting us know? This helps us to better see what issues are still affecting our users. If there is no further activity, this issue will be automatically closed.

@stale stale bot added the needs-update label Jun 11, 2019
@mnordhoff
Copy link
Contributor

Still relevant, bot.

@stale stale bot removed the needs-update label Jun 11, 2019
@cpu
Copy link
Contributor

cpu commented Jun 11, 2019

If the ACME server exposes a "caa-identities" key in its /directory response's "meta" key, Certbot should expose that to users so that they know what string to use if they wish to configure CAA.

One update: per RFC 8555 Section 7.1.1 this is now the "caaIdentities" key. All of the hyphenated directory keys were changed to camel case at some point during the standardization process.

@stale
Copy link

stale bot commented Jun 10, 2020

We've made a lot of changes to Certbot since this issue was opened. If you still have this issue with an up-to-date version of Certbot, can you please add a comment letting us know? This helps us to better see what issues are still affecting our users. If there is no activity in the next 30 days, this issue will be automatically closed.

@stale stale bot added the needs-update label Jun 10, 2020
@stale
Copy link

stale bot commented Jul 11, 2020

This issue has been closed due to lack of activity, but if you think it should be reopened, please open a new issue with a link to this one and we'll take a look.

@stale stale bot closed this as completed Jul 11, 2020
@osirisinferi
Copy link
Collaborator

Probably still a good idea, inadvertably closed by stalebot.

@osirisinferi osirisinferi reopened this May 24, 2022
@stale stale bot removed the needs-update label May 24, 2022
@alexzorin alexzorin removed this from the 2.0 milestone May 25, 2022
@github-actions
Copy link

We've made a lot of changes to Certbot since this issue was opened. If you still have this issue with an up-to-date version of Certbot, can you please add a comment letting us know? This helps us to better see what issues are still affecting our users. If there is no activity in the next 30 days, this issue will be automatically closed.

@hablutzel1
Copy link

In addition, certbot could provide a hook (or something like that) to automatically update the DNS CAA records for the specific domains covered by the ACME order.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

7 participants