-
Notifications
You must be signed in to change notification settings - Fork 647
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Let's encrypt... #6
Comments
|
We now have acme-tiny in our eco-system if anyone wants to try... |
|
@fichtner: Would you mind to add the |
|
Was already done, package will be in 16.1.16
|
|
Looks like |
|
acme-client gained a "static" option now to be usable with OpenSSL, but our build system is not clever enough for this just yet. Just FYI. |
|
@fraenki from the looks of it, acme-client can now be shipped in both LibreSSL and OpenSSL flavours. |
|
@fichtner Yes, just recently installed it on my FreeBSD test VM. I hope to provide a rough concept for how I want to implement LE in OPNsense. Some workarounds are required, but I hope to integrate it with HAProxy, Load balancer (relayd) and the bundled lighttpd. Alpha-quality code should follow soonish. I'm several weeks behind my schedule, but I hope to provide a first alpha version in january. |
|
you might really want to look at https://github.com/Neilpang/acme.sh .. i am using it right now on the opnsense instances, it works pretty good. The current point would be, to reimport the certis when they are issued into opnsense, so more or less a sync between the cert/key folder of acme.sh folder and opnsense configuration. Using the external script we get:
So a lot less code to maintain or rather develop |
|
@EugenMayer can you post some small examples of how this should work? This sounds practical, the first time I looked at integrating let's encrypt there was just too much glue needed to make it functional, if this is easier I might be willing to do the work for this feature. |
|
sure right now on a fresh 17.1 installation, i do the latter command just deploys the cron job for acme automatically get new certificates to get a new certificate using ACME with in my case cloudfront You can use other modes then --dns or a dns with a API integration ( you can go the manual way ) and all kinds, so very flexible. But when thinking about opnsense, most probably the webserver will not be accessible by the letsencrypt servers, so ACME using DNS sounds like the perfect match |
|
No examples required, the plugin is almost complete. |
|
@fraenki will it have and cloud-dns integration for ACME dns verifcation? |
|
@EugenMayer If you mean Cloudflare, then yes. |
|
Some minor things to do: acme_http_challenge should probably be a plugin file, not a template. the permission fixup though setup.sh is weird and causes the above error. I'll try to apply a bandaid. |
|
@fraenki ok, that should be all. can you double-check to approve this? |
|
I am not seeing this plugin available in the WebUI for 16.7.14 -- is that intentional or is there something I need to do to update the plugins list? |
|
@syserr0r It was added to the tree just today ;) since 16.7.14 is EOL, the plugin will only be shipped with 17.1 and up |
|
Ah the plugin list is set at build time and not pulled from here -- I hadn't realized. Edit: Actually, it looks like it is pulled from here but there is another branch for 16.x and 17.x |
using either:
security/py-letsencrypt -- APACHE20
security/letsencrypt.sh (bash) -- MIT
security/py-acme-tiny -- MIT
https://github.com/kuba/simp_le -- GPLv3 licensed
via: https://forum.opnsense.org/index.php?topic=2319.0
The text was updated successfully, but these errors were encountered: