mirror of
https://github.com/dehydrated-io/dehydrated.git
synced 2026-01-11 22:30:44 +01:00
Support HPKP #55
Reference in New Issue
Block a user
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @basbebe on GitHub (Feb 10, 2016).
I would be a great addition if this script also pu out something which could be used in HKPK headers, e.g. with hooks.
For an example see
https://calomel.org/lets_encrypt_client.html
@lukas2511 commented on GitHub (Feb 10, 2016):
You should be able to do that inside the deploy_cert hook. I don't really see any benefit of having this directly inside of this script.
@basbebe commented on GitHub (Feb 10, 2016):
Accepted.
I'll try to learn how to do this.
@basbebe commented on GitHub (Feb 11, 2016):
This is what I'm trying out at the moment.
I have yet to find out how to automatically replace the parts in my server config though…
@germeier commented on GitHub (Feb 11, 2016):
Shouldn't an include directive do the trick? This way you only need to generate a file with the HKPK config.
@basbebe commented on GitHub (Feb 11, 2016):
yes, that might be a good idea!
https://github.com/lukas2511/letsencrypt.sh/issues/131
@basbebe commented on GitHub (Feb 18, 2016):
How about having an option in the config and making this a part of lets encrypt.sh?
add a file with the HKPK hash for embedding it somewhere with a hook!
@lukas2511 commented on GitHub (Feb 18, 2016):
And create that file in every config format for every webserver out there? No thanks.
@basbebe commented on GitHub (Feb 18, 2016):
The hash is the same, it is just different for RSA and ECDSA certificates.
https://calomel.org/http_public_key_pinning_hpkp.html
Then the hash can be opened and handled by the users.
No need to adapt to any webservers.
@lukas2511 commented on GitHub (Feb 18, 2016):
The config file format for every webserver out there is different.
If this would be a feature I'd either have to decide on which servers to support or support them all.
A few config-syntax examples are listed in the url you posted in the first message of this conversation:
You should easily be able to do that for your specific webserver configuration in a hook script, but this will never be a feature of this script.
@basbebe commented on GitHub (Feb 18, 2016):
I thought just about the hash, not the whole header implementation.
FdFOH8lP8ipUaas4cnj92Ifk81feECxL/RGDps3otfw=Then it could be included in the server config dynamically or manipulated with a script.
@lukas2511 commented on GitHub (Feb 18, 2016):
Just use hook scripts... doing it this way just makes everything a lot more complicated.
@basbebe commented on GitHub (Feb 18, 2016):
OK.
I just thought it would be nice to have a file symlinking to the latest version, just like the keys and the certificates. Thought it might be helpful for others as well.
@basbebe commented on GitHub (Feb 26, 2016):
I'm still pursuing this.
I would need to have
${KEY_ALGO}and${timestamp}passed to the hook for this to work.Or it could become integrated into letsencrypt.sh and become an option.
Depending on which option you would prefer I would try to make a pull request.
This is what I have so far:
@lukas2511 commented on GitHub (Feb 29, 2016):
creating a textfile like this would be okay.
on the deploy_cert hook i'd then like to just have the timestamp added, so that it can be used for future features and we don't need to add more options all the time.
@lukas2511 commented on GitHub (Jan 29, 2017):
This should be doable in the
deploy_certhook by now, everything that is needed for generating those config entries is exported and there even is support for key rollover now, making this actually useful.@vi commented on GitHub (Feb 7, 2017):
Maybe there should be a mode with fixed private key and CSR to have a permanent pin?Like with
--signcsrmode, but employing/var/lib/dehydrated/certs/structure (withprivkey.pemandcert.csras regular files, not symlinks)?Maybe the
PRIVATE_KEY_RENEWconfig options should be better advertised/documented?@txr13 commented on GitHub (Feb 7, 2017):
@vi Was having that option written up in the
configfile (which is linked to from the readme) not sufficient?@vi commented on GitHub (Feb 7, 2017):
I don't see it in the README.
I discovered it from the source code after already deploying
--signcsr-based scheme.And finally only now I found this.
Also Debian's default
/etc/dehydrated/configlooks much shorter...@txr13 commented on GitHub (Feb 7, 2017):
From
README.md:From
docs/examples/config:@vi commented on GitHub (Feb 7, 2017):
Yes, now I found.