Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Find a way to make client cert auth use the actual LetsEncrypt #16

Open
michielbdejong opened this issue May 30, 2016 · 1 comment
Open

Comments

@michielbdejong
Copy link
Contributor

Looking back at how we made this work, it seems that the client creates a self-signed cert whose hash determines its URL under .box.knilxof.org, but then it serves the LetsEncrypt cert, which will have a different hash altogether. It would be better if we use the hash of the actual LetsEncrypt cert, but the client already needs to edit DNS when only a csr exists, so not sure if/how we can extract the public key hash from the csr. Will have a look at which files letsencrypt.sh produces.

@michielbdejong
Copy link
Contributor Author

The client cert used for api call is client/scripts/certs/server/my-server.crt.pem, so that's the one that should determine the URL used (through client/scripts/domains.txt) in the Common Name when creating the actual LetsEncrypt cert. It's impossible to know what the hash of the LetsEncrypt cert will be before we generate it (because the CN needs to be inside the cert).

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant