[tech] Wildcard SSL/TLS certificates on core servers

David Adam zanchey at ucc.gu.uwa.edu.au
Wed May 15 23:44:24 AWST 2019


On Mon, 13 May 2019, David Adam wrote:
> We've been using Let's Encrypt to get free SSL certificates since it 
> launched, including for all member domains [1]. We settled on acmetool as 
> the most sensible client at the time.
> 
> Two things have changed:
>  - the ACMEv1 protocol is being deprecated, and acmetool does not yet 
>    support ACMEv2 and appears to no longer be actively maintained [2]
>  - wildcard certificates are available through Let's Encrypt, requiring 
>    DNS-01 challenges and a client that support ACMEv2.
> 
<snip> 
> I'll start adding these certificates to the various SSL services on Motsugo,
> Mussel, and Mooneye. The only service which definitely can't use a wildcard is
> the IPsec VPN [5], so the magic secure.ucc certificate mechanisms probably need
> to remain in place for now (but I'll look at adding that to the DNS 
> configurator as well).

I've migrated all domains and services on Mussel, Motsugo, Mooneye and
Murasoi (Web, SMTP/POP3, IMAP and IPsec) away from acmetool-issued
certificates to certbot-issued certificates. I've also moved Gitlab to
using the internal Let's Encrypt machinery rather than acmetool.

Finally, I disabled the certificate magic in
/home/wheel/bin/acmemembers.py and zonemake - we just use plain wildcard
certificates for user domains now.

Instructions on how to set things up for new machines or domains are
at https://wiki.ucc.asn.au/SSLCertificates

David Adam
zanchey@


More information about the tech mailing list