Bandwith and CPU resources aside, there's no real problem with it.
If you wish to add authentication in front of acme-dns, you could for example use a reverse Nginx proxy and set up basic authentication in it. That will require slight modifications to the hook script however.
Firewall rules are probably the best way to restrict the API access, if you control a somewhat static set of potential clients.
I have been following this thread since I got a reply in another thread from danb35.
I’ve been able to manually acquire my wildcard ssl cert thanks to everyone’s help so far but I need to get this working using acme-dns as there are many wildcard ssl certs to get and it’s not practical to manually get and update the txt records every 60 days for all the domains.
BUT… What I can’t grasp still for this automatic acme-dns method is where in the procedure does LE let’s me know what the txt record it is looking for so I can post the credentials and txt to my acme-dns server.
I must be missing something fundamentally simple and it’s in front of my nose and I can’t see it.
Do I manually get the txt record necessary and use that to update the acme-dns instance BUT… that would defeat the automatic part of updating it.
The idea is that you also run a Let’s Encrypt client application like Certbot. The Let’s Encrypt client receives the details of the TXT record that the CA wants to have created via the ACME protocol.
With Certbot, this can be used with something like
to then make the necessary updates in acme-dns. After all, acme-dns is not an alternative to a Let’s Encrypt client like Certbot; it’s a complement to the Let’s Encrypt client that exists in order to let it perform a DNS-01 challenge without having a separate DNS provider that supports API-based TXT record updates.