Integrating Certbot with DNS4ACME¶
Tip
Alternative to this method, you can also integrate Certbot using the --manual --manual-auth-hook
option. See the nsupdate
method for details.
If you would like Certbot to send DNS 2136 updates to DNS4ACME directly, you can use the certbot-dns-rfc2136
package. Depending on your Certbot distribution, you may need to install this package separately.
Creating a config file¶
First, you need to create a configuration file on how to update DNS4ACME:
dns_rfc2136_server = 192.0.2.1 ; (1)!
dns_rfc2136_port = 53 ; (2)!
dns_rfc2136_name = _acme-challenge.yourdomain.com ; (3)!
dns_rfc2136_secret = ... ; (4)!
dns_rfc2136_algorithm = HMAC-SHA512 ; (5)!
- This should point to your DNS4ACME server.
- Typically, this remains on port 53.
- This name must match your domain name exactly.
- This is your secret that you configured in the DNS4ACME backend.
- Signing algorithm. Must be
HMAC-SHA256
orHMAC-SHA512
. Older signing algorithms such asHMAC-MD5
are not supported.
Creating a certificate¶
Now you can create a certificate:
certbot certonly \
--dns-rfc2136 \
--dns-rfc2136-credentials path/to/your/config.ini \
-d example.com
Note
Certbot currently only supports using one key per run. This may not work with DNS4ACME because the name of the key may have to be different per domain.