mirror of
https://github.com/dehydrated-io/dehydrated.git
synced 2026-01-11 22:30:44 +01:00
Multiple algorithms for single sets of domains (by default) #300
Reference in New Issue
Block a user
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @lukas2511 on GitHub (Mar 12, 2018).
It would be great if dehydrated would (ideally by default) allow for a multi-cert configuration with RSA and elliptic curves like suggested in the Let's Encryption Integration Guide. This would allow for modern and fast cryptography with a fallback for older clients.
This would basically affect the
sign_domainandcommand_sign_domainfunctions, a few filenames would change but backwards compatibility will be a priority.I think the ideal output would be a directory structure like this:
I'm thinking about having the config look something like this:
KEY_ALGO="rsa secp384r1"The main symlinks like
fullchain.pemwould point to the first given algorithm, which will make the new scheme fully compatible with the old one (where only one was set, default being "rsa").The certificates will be generated fully independent of each other, but double-authorization of domains shouldn't be required as the authorizations are "cached" by the CA, so this wouldn't really make the script much slower and for bigger setups there always will be the option to just choose an algorithm by setting the config variable.
@darix commented on GitHub (Mar 12, 2018):
+1 :D
I already checked the docs. nginx and apache can do it. I will find out if haproxy can do it soon.
@NotActuallyTerry commented on GitHub (Mar 14, 2018):
Haproxy can do it perfectly, provided:
example.com.pem.rsa example.com.pem.ecdsaI currently have a setup like this running by using two configs sharing the same account. Such an option would prove rather useful.
@lukas2511 commented on GitHub (Mar 14, 2018):
@twrist great to hear that people are actually using setups like this. does haproxy really need those file-endings or are they configurable?
@NotActuallyTerry commented on GitHub (Mar 17, 2018):
For doing bundling, the file endings are required and cannot be configured to be different. However, if a setup only uses an RSA/ECDSA certificate it doesn't require the extension.
The config manual explains how it works towards the lower half of the relevant section.
@alainwolf commented on GitHub (Mar 17, 2018):
Nginx can do it, but you can't use it with "
ssl_stapling_file". As Nginx allows multiple "ssl_certificate" statements but only allows one stapling file.@martin21 commented on GitHub (Apr 2, 2018):
Postfix can do it as well. I intend to use it with Postfix and look forward to this feature.
@xpand-it commented on GitHub (Dec 10, 2018):
+1 I'd like to use this feature as well. Would be great to have it. Thanks for your work @lukas2511
@mark9064 commented on GitHub (Dec 25, 2018):
would love to see this as well +1
@fei0316 commented on GitHub (Mar 21, 2019):
+1 would love to see that happening. Though ECDSA is quite ubiquitous nowadays, it's always nice to support RSA as well.
As a side question, what would be an appropriate way to implement multiple algorithms for the one set of domains now?
@ghost commented on GitHub (Sep 5, 2019):
This would be especially useful for public mail servers, as modern clients could benefit from ECDSA performance, while legacy ones will still be able to use RSA and won't fall back to plaintext.
@nicoduck commented on GitHub (May 15, 2024):
Any update on that? I'm trying to figure out the least-painful way to get ECDSA and RSA certs into postfix.
@darix commented on GitHub (May 15, 2024):
well the manual way already works
https://nordisch.org/posts/advanced-dehydration/
this issue is about doing it automatically.
@saz commented on GitHub (May 15, 2024):
I'm using a simple wrapper script:
/usr/local/bin/dehydrated:
The original dehydrated command is located in
/usr/local/bin/dehydrated.upstreamIt's still not perfect. E.g. challenge validation might fail and dehydrated might continue (depending on the options you're setting) and the second time it will try it again (as it's executed twice) and you might hit some rate limits.
But it's still easier for me to handle certificates like that.
HTH
@darix commented on GitHub (May 15, 2024):
tbh the config file version which is supported by dehydrated out of the box is way less painful than that :)
@saz commented on GitHub (May 15, 2024):
@darix can you provide more details?
@rjhenry commented on GitHub (May 15, 2024):
Did you read the linked blog post (here? That goes into detail on how to set up multiple-algorithm certificates.
@saz commented on GitHub (May 15, 2024):
Yes, but I still don't understand why it's less painful. I need to add the wrapper once, add a domain to domains.txt and that's it.
The other requires a cert specific config for all domains. Looks more painful to me, but that's just my opinion on that :)