Hello all,
I've found many posts around my issue but not quite what I think is my issue.
Goal, auto-renew either 4 host specific certificates (one certificate with 4 hosts in the SAN list could work but there is a risk renewing all 4 at the same time. Even 2 and 2 would be better).
Environment:
On premise Bind9, apache, and sendmail (TLS) I'd like issue certs for.
This immediate needs is for my sendmail server's TLS certificates. These server do not run Bind or a www server. I'd rather not open more incoming ports to this server but I'm open to discussion. My understanding is the certs will be requested elsewhere on my Bind server (current attempt) or my www server then distributed internally with rsync, scripts etc.
c-mail-1.atlatravel.com
c-mail-2.atlatravel.com
a-mail-1.atlatravel.com
a-mail-2.atlatravel.com
Progress so far:
Currently working (using cerbot on my bind server):
/usr/bin/certbot certonly --dns-rfc2136 --dns-rfc2136-credentials /etc/letsencrypt/dns_rfc2136_credentials.txt -d atlastravel.com -d *.atlastravel.com --dry-run
Currently not working:
root@dmz-peleg:/etc/bind# /usr/bin/certbot certonly --dns-rfc2136 --dns-rfc2136-credentials /etc/letsencrypt/dns_rfc2136_credentials.txt -d atlastravel.com -d www.atlastravel.com --dry-run
Saving debug log to /var/log/letsencrypt/letsencrypt.log
Plugins selected: Authenticator dns-rfc2136, Installer None
Obtaining a new certificate
Performing the following challenges:
dns-01 challenge for atlastravel.com
dns-01 challenge for www.atlastravel.com
Cleaning up challenges
Encountered exception during recovery:
Traceback (most recent call last):
File "/usr/lib/python3/dist-packages/certbot/auth_handler.py", line 75, in handle_authorizations
resp = self._solve_challenges(aauthzrs)
After much reading, I suspect dns validation requires a zone delegation for each host name in this case www. IMO, this is impractical. And I should probably switch to using a web server and web validation.
Before I give up on dns validation, I'm looking for help or confirmation. Our apache servers have some turn over to them but dns has been stable for a long time. So I see an advantage to settings this up with dns validation.
I'm looking to have explicit host names in the common name or SAN list due to compliance scanning reasons. I believe SAN entries will also pass the scan but not confirmed. Our current wildcard cert is getting dinged for being a wildcard.
Finally, if I can't get the auto-renew working in an automated fashion, I think paying for a longer expiry commercial certificate would be our direction.
Thanks your guidance and sorry in advance if this is an FAQ or frequent topic that I'm just missing.
Scott