Hover.com DNS challenge for SSL

My domain is: pavia.ca - pointing to Tailscale which routes to my server

I'm trying to setup an SSL certificate in NGNIX on Truenas. My domain provider is hover.com. The Credentials Content it asks for is:

dns_hover_hoverurl = https://www.hover.com
dns_hover_username = hover-admin-username
dns_hover_password = hover-admin-password
dns_hover_totpsecret = 2fa-totp-secret

just can't get it to work. the errors indicate login issues, and I've tried everything I can think of. one thing that perplexs me is the 2fa-totp-secret - how do I know what this is before they send it? I've tried putting in what I get texted and then resubmitting, but doesn't work.

Searched the internet and can't find anything like this - similar, but none of the potential solutions worked for me. Got locked out of hover.com and had to reset my password too.

thoughts?

Would you provide more details about what you actually tried? Are you using Certbot? If so, what is the command? Or, what other method have you tried? There are numerous ways to request certs.

Where did you get the instructions for those options? Do they have a support forum?

We don't see Hover on this forum very often. I thought they did not offer a DNS API for adding/deleting the TXT records for a DNS Challenge. That appears to be what you are trying to do.

I also thought their name servers were just ns1.hover.com and ns2. But, your DNS is configured to use a different group of DNS servers.

Are you even sure what you are trying to do is supported by your DNS provider?

4 Likes

I suspect the extraction of the totp-secret may involve a somewhat unusual enrollment method (like signing up for the two-factor authentication at Hover.com using a desktop TOTP app instead of a mobile app, and then extracting the secret value from the desktop app, or something). It's actually somewhat unusual that end users (as opposed to API service administrators) have any way to get access to their TOTP secret strings!

1 Like

Not really. You cannot configure your 2FA app without the TOTP seed. It is present in every setup QR code, even if the provider doesn't offeran option to view the string in plain text. It may be unusual for basic users to know that, but any user can access it during 2FA setup since the process cannot be completed without sharing that value with the user.

5 Likes

Thanks everyone - you've been a great help - I truely appreciate your insight. My confusion was the "2fa-totp-secret". I thought that it was the "web code" (random number generated every 30 seconds) but it is exactly as you've indicated - it's the "secret key" which is generated with the QR code.

Hover is moving from email/text 2FA to mandating an authenticator app. I switched my account settings to enable this (turned off 2FA, turned it back on) which then took me through the process of generating a QR code and activating in an Authenticator App - in the process it gave me the "secret key" (to use just in case the QR code doesn't work) - I've captured all this and printed it out for future.

Worked perfectly

for future as I could not find anything on the web indicating an "easy" solution to this - below parameters in laymans terms - hope it helps someone in the future.

dns_hover_hoverurl = https://www.hover.com
dns_hover_username = your console user name
dns_hover_password = your password
dns_hover_totpsecret = secret key used to generate the QR code which you use to activate in the authenticator app

3 Likes

I want to repeat - you guys are great. So often it's difficult to get help as a non expert. I have much experience coding, but it's not my profession, and have never been formally trained. Simple brainstorming really helps someone like me think things through. Would not have been able to do it without you.

Thank you!

5 Likes

I am sure I speak for all helpers that you are very welcome.

Might be helpful for future searches to know what ACME Client you used. There really are dozens if not hundreds of ways to get certificates.

3 Likes

everything was done inside the web interface for Nginx Proxy Manager:

2 Likes

Thanks. Currently NPM uses Certbot ACME Client for that. The EFF, who supports Certbot, does not provide a DNS plugin for Hover but there are 3rd party plugins for many other systems.

I believe the one used by NPM is this one: Client Challenge

As indicated here: nginx-proxy-manager/global/certbot-dns-plugins.json at 487fa6d31b10bf168b8654d698e5d36ee40f2f40 · NginxProxyManager/nginx-proxy-manager · GitHub

This is partly for future reference because as I mentioned we don't see Hover DNS often :slight_smile:

We are also generally not fans of NPM here given how opaque it is when problems develop

3 Likes

@linkp Thanks for the correction! That makes perfect sense. I was somehow thinking there there was some form of interactivity in the protocol that resulted in a secret string jointly created between the site and the authenticator software, but of course you're right that it's unilateral and therefore the secret is directly present within the QR code.

@mpavia I'm glad this information helped you figure out what was needed here!

3 Likes

This topic was automatically closed 30 days after the last reply. New replies are no longer allowed.