acmed(8): more improvements
This commit is contained in:
parent
854cd42fe1
commit
ae9918c93e
1 changed files with 162 additions and 61 deletions
223
sys/man/8/acmed
223
sys/man/8/acmed
|
@ -13,26 +13,41 @@ ip/acmed \- acme certificate client
|
||||||
|
|
|
|
||||||
.B -o
|
.B -o
|
||||||
.I chalout
|
.I chalout
|
||||||
|
.B -t
|
||||||
|
.I type
|
||||||
]
|
]
|
||||||
[
|
[
|
||||||
.B -p
|
.B -p
|
||||||
.I provider
|
.I provider
|
||||||
]
|
]
|
||||||
[
|
|
||||||
.B -t
|
|
||||||
.I type
|
|
||||||
]
|
|
||||||
.I acctname
|
.I acctname
|
||||||
.I csr
|
.I csr
|
||||||
|
>
|
||||||
|
.I crt
|
||||||
.SH DESCRIPTION
|
.SH DESCRIPTION
|
||||||
Acmed fetches and renews TLS certificates
|
Acmed fetches and renews a TLS certificate
|
||||||
using the
|
using the
|
||||||
.I acme (RFC8555)
|
.I ACME (RFC8555)
|
||||||
protocol.
|
protocol.
|
||||||
It requires a pre-generated account key
|
It requires a pre-generated account key in
|
||||||
and certificate signing key.
|
.IR factotum (4)
|
||||||
|
that is identified by
|
||||||
|
.I acctname
|
||||||
|
or an
|
||||||
|
.I acctkey
|
||||||
|
file.
|
||||||
|
It also needs a certificatficate signing request file
|
||||||
|
.I csr
|
||||||
|
in binary X.509 ASN.1/DER format
|
||||||
|
that contains the public key and subjects (domain names)
|
||||||
|
that we want to get a certificate for.
|
||||||
|
On success,
|
||||||
|
.I acmed
|
||||||
|
outputs the new certificate in
|
||||||
|
PEM format to stdandard output.
|
||||||
.PP
|
.PP
|
||||||
Acmed accepts the following options:
|
.I Acmed
|
||||||
|
accepts the following options:
|
||||||
.TP
|
.TP
|
||||||
.B -a
|
.B -a
|
||||||
.I acctkey
|
.I acctkey
|
||||||
|
@ -41,22 +56,34 @@ Specifies that
|
||||||
is used to sign requests to the
|
is used to sign requests to the
|
||||||
.I provider
|
.I provider
|
||||||
in place of the default
|
in place of the default
|
||||||
.IR /sys/lib/tls/acme/$acctname.pub .
|
.BI /sys/lib/tls/acme/ acctname .pub
|
||||||
The key must be a
|
file.
|
||||||
.I jwk
|
The key must be a JWK formatted RSA public key
|
||||||
formatted RSA key.
|
(see
|
||||||
|
.IR rsa (8)).
|
||||||
.TP
|
.TP
|
||||||
.B -e
|
.B -e
|
||||||
.I cmd
|
.I cmd
|
||||||
Specifies that an external command should be run to
|
Specifies that an external command should be run to
|
||||||
install the challenge response.
|
install the challenge material.
|
||||||
The
|
The
|
||||||
.I cmd
|
.I cmd
|
||||||
is run with the following four arguments:
|
is run with the following four arguments:
|
||||||
The challenge method,
|
The challenge method,
|
||||||
the identifier (domain),
|
the subject (domain),
|
||||||
the token,
|
the token,
|
||||||
and last the challenge response.
|
and last the challenge response.
|
||||||
|
If
|
||||||
|
.I cmd
|
||||||
|
returns an error status,
|
||||||
|
it is assumed that it does not support the
|
||||||
|
challenge method for the given subject (domain)
|
||||||
|
and another method might be tried.
|
||||||
|
Because of this, the
|
||||||
|
.B -o
|
||||||
|
and
|
||||||
|
.B -t
|
||||||
|
options are unnecessary.
|
||||||
.TP
|
.TP
|
||||||
.B -o
|
.B -o
|
||||||
.I chalout
|
.I chalout
|
||||||
|
@ -70,70 +97,103 @@ flag.
|
||||||
.IP
|
.IP
|
||||||
For HTTP challenges,
|
For HTTP challenges,
|
||||||
.I chalout
|
.I chalout
|
||||||
must be a directory that your choice of
|
must be a directory that your webserver will serve at
|
||||||
.I httpd
|
.br
|
||||||
will serve at
|
.BI http:// mydomain.com /.well-known/acme-challenge .
|
||||||
.IR http://domain.com/.well-known/acme-challenge .
|
.br
|
||||||
|
It defaults to
|
||||||
|
.BR /usr/web/.well-known/acme-challenge .
|
||||||
|
.IP
|
||||||
For DNS challenges,
|
For DNS challenges,
|
||||||
.I chalout
|
.I chalout
|
||||||
is a file that should be included in your
|
is a file that should be included in your
|
||||||
.I ndb
|
.IR ndb (6)
|
||||||
database.
|
database.
|
||||||
.IP
|
It defaults to
|
||||||
If unspecified,
|
.BR /lib/ndb/dnschallenge .
|
||||||
.I http
|
.TP
|
||||||
challenges will output to
|
.B -t
|
||||||
.IR /usr/web/.well-known/acme-challenge ,
|
.I type
|
||||||
whle
|
Specifies that the challenge type. Supported challenge
|
||||||
.I dns
|
types are currently
|
||||||
challenges will output to
|
.B http
|
||||||
.IR /lib/ndb/dnschallenge .
|
and
|
||||||
|
.BR dns .
|
||||||
.TP
|
.TP
|
||||||
.B -p
|
.B -p
|
||||||
.I provider
|
.I provider
|
||||||
Specifies that
|
Specifies that
|
||||||
.I provider
|
.I provider
|
||||||
is used as the provider URL, in place of the default
|
is used as the provider URL, in place of the default
|
||||||
.IR https://acme-v02.api.letsencrypt.org/directory .
|
.BR https://acme-v02.api.letsencrypt.org/directory .
|
||||||
This must be the directory URL for the desired
|
This must be the directory URL for the desired
|
||||||
.I RFC8555
|
.I RFC8555
|
||||||
compliant provider
|
compliant provider.
|
||||||
.TP
|
|
||||||
.B -t
|
|
||||||
.I type
|
|
||||||
Specifies that the challenge type. Supported challenge
|
|
||||||
types are currently
|
|
||||||
.I http
|
|
||||||
and
|
|
||||||
.IR dns .
|
|
||||||
.SH EXAMPLES
|
.SH EXAMPLES
|
||||||
Before
|
Before
|
||||||
.B acmed
|
.I acmed
|
||||||
is run, the keys must be generated.
|
can be used, the account key must be generated:
|
||||||
.IP
|
.IP
|
||||||
.EX
|
.EX
|
||||||
auth/rsagen -t 'service=acme role=sign hash=sha256 acct=a@b.org'\\
|
auth/rsagen -t \\
|
||||||
>acct.key
|
'service=acme role=sign hash=sha256 acct=me@example.com' \\
|
||||||
auth/rsa2jwk acct.key >/sys/lib/tls/acmed/me@example.org.pub
|
> acct.key
|
||||||
auth/rsagen -t 'service=tls owner=*' >cert.key
|
auth/rsa2jwk acct.key > /sys/lib/tls/acmed/me@example.com.pub
|
||||||
|
.EE
|
||||||
|
.PP
|
||||||
|
Then the
|
||||||
|
.B acct.key
|
||||||
|
must be loaded into
|
||||||
|
.IR factotum(4).
|
||||||
|
It is recommended to put
|
||||||
|
.B acct.key
|
||||||
|
into
|
||||||
|
.IR secstore (1)
|
||||||
|
instead of saving it unencrypted on the file system.
|
||||||
|
.IP
|
||||||
|
.EX
|
||||||
|
cat acct.key > /mnt/factotum/ctl
|
||||||
|
.EE
|
||||||
|
.PP
|
||||||
|
On the TLS server side, you can generate a RSA key
|
||||||
|
and certificate signing request file like this:
|
||||||
|
.IP
|
||||||
|
.EX
|
||||||
|
auth/rsagen -t 'service=tls owner=*' > cert.key
|
||||||
auth/rsa2csr 'CN=mydomain.com' cert.key \\
|
auth/rsa2csr 'CN=mydomain.com' cert.key \\
|
||||||
>/sys/lib/tls/acmed/mydomain.com.csr} \\
|
> /sys/lib/tls/acmed/mydomain.com.csr
|
||||||
.EE
|
.EE
|
||||||
.PP
|
.PP
|
||||||
This need only be run once.
|
See
|
||||||
.EE
|
.IR rsa (8)
|
||||||
|
and
|
||||||
|
.IR tlssrv (8)
|
||||||
|
for more examples on how to use RSA keys.
|
||||||
|
.IP
|
||||||
.PP
|
.PP
|
||||||
The certificate for the domain can now be fetched:
|
The certificate for the domain can now be fetched.
|
||||||
|
This requires
|
||||||
|
.IR webfs(4)
|
||||||
|
to be mounted as the ACME protocol uses HTTP
|
||||||
|
to talk to the provider.
|
||||||
.IP
|
.IP
|
||||||
.EX
|
.EX
|
||||||
ip/acmed me@example.org /sys/lib/tls/acmed/mydomain.com.csr \\
|
ip/acmed me@example.com /sys/lib/tls/acmed/mydomain.com.csr \\
|
||||||
>/sys/lib/tls/acmed/mydomain.com.crt
|
> /sys/lib/tls/acmed/mydomain.com.crt
|
||||||
.EE
|
.EE
|
||||||
|
|
||||||
.PP
|
.PP
|
||||||
When using a DNS challenge, your DNS server must be
|
When using the DNS challenge method,
|
||||||
configured, and must be configured to include the
|
your DNS server
|
||||||
DNS challenge file:
|
(see
|
||||||
|
.IR ndb (8))
|
||||||
|
must be configured,
|
||||||
|
and
|
||||||
|
.IR ndb (6)
|
||||||
|
must be setup to include the
|
||||||
|
.I chalout
|
||||||
|
file that
|
||||||
|
.I acmed
|
||||||
|
can write to:
|
||||||
.IP
|
.IP
|
||||||
.EX
|
.EX
|
||||||
database=
|
database=
|
||||||
|
@ -143,20 +203,61 @@ database=
|
||||||
file=/lib/ndb/dnschallenge
|
file=/lib/ndb/dnschallenge
|
||||||
.EE
|
.EE
|
||||||
.PP
|
.PP
|
||||||
And
|
In addition, the domains that you like to get verified
|
||||||
|
needs to have a certificate authority authorization record
|
||||||
|
of your ACME provider declared:
|
||||||
|
.IP
|
||||||
|
.EX
|
||||||
|
dom=mydomain.com caa=letsencrypt.org
|
||||||
|
.EE
|
||||||
|
.PP
|
||||||
|
Then
|
||||||
.I acmed
|
.I acmed
|
||||||
must be invoked like:
|
can be invoked to fetch the certificate using the
|
||||||
|
DNS challenge method:
|
||||||
.IP
|
.IP
|
||||||
.EX
|
.EX
|
||||||
ip/acmed -t dns me@example.com mydomain.com.csr \\
|
ip/acmed -t dns me@example.com mydomain.com.csr \\
|
||||||
>mydomain.com.crt
|
> /sys/lib/tls/acmed/mydomain.com.crt
|
||||||
.EE
|
.EE
|
||||||
.SH SEE ALSO
|
.SH FILES
|
||||||
.IR rsa (8),
|
.BI /sys/lib/tls/acmed/ * .pub
|
||||||
.IR srvtls (4).
|
Account public keys.
|
||||||
.SH SOURCE
|
.SH SOURCE
|
||||||
.B /sys/src/cmd/ip/acmed.c
|
.B /sys/src/cmd/ip/acmed.c
|
||||||
|
.SH SEE ALSO
|
||||||
|
.IR factotum (4),
|
||||||
|
.IR ndb (6),
|
||||||
|
.IR ndb (8),
|
||||||
|
.IR rsa (8),
|
||||||
|
.IR secstore (1),
|
||||||
|
.IR tlssrv (8),
|
||||||
|
.IR webfs (4).
|
||||||
.SH BUGS
|
.SH BUGS
|
||||||
|
.PP
|
||||||
|
When using DNS challenge,
|
||||||
|
the
|
||||||
|
.B -t
|
||||||
|
.B dns
|
||||||
|
method assumes that the DNS server runs
|
||||||
|
on the same machine as
|
||||||
|
.I acmed
|
||||||
|
and that it is mounted on
|
||||||
|
.B /net
|
||||||
|
and that we have hostowner permissions to
|
||||||
|
write the
|
||||||
|
.B refresh
|
||||||
|
command to
|
||||||
|
.BR /net/dns .
|
||||||
|
Also, when using multi-domain certificates,
|
||||||
|
the usable challenge methods might be different for
|
||||||
|
individual domains.
|
||||||
|
Using the
|
||||||
|
.B -e
|
||||||
|
.I cmd
|
||||||
|
option to customize the challenge installation procedure
|
||||||
|
can be used to work around this.
|
||||||
|
.PP
|
||||||
.B https://bugzilla.mozilla.org/show_bug.cgi?id=647959
|
.B https://bugzilla.mozilla.org/show_bug.cgi?id=647959
|
||||||
.SH HISTORY
|
.SH HISTORY
|
||||||
.PP
|
.PP
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue