-
Notifications
You must be signed in to change notification settings - Fork 17.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
x/crypto/acme,autocert: add support for TLS-ALPN #25013
Comments
Folks interested in working on support for this challenge type in |
@cpu will this feature be available on Let's Encrypt in v1 or only in v2? Or you don't know yet... |
@x1ddos I don't think it has been discussed yet. |
btw, I think it was discussed yet and I heard from Roland that it would likely be available in both. |
I'll start working on this. |
Thanks! Take a look at certificate generation at [0], I think not much more should be needed in x/crypto/acme itself, other than wiring [0] https://github.com/mdebski/golang-alpn-example/blob/master/alpnexample.go#L50 |
Correct 👍 Thanks for sharing that news here @mdebski |
Change https://golang.org/cl/116995 mentions this issue: |
This adds support for the new challenge type, as described in https://tools.ietf.org/html/draft-ietf-acme-tls-alpn-01 Updates golang/go#25013 Change-Id: I81b335ff4b4e89e705a70e7d38dd21c3d5f5c25f Reviewed-on: https://go-review.googlesource.com/116995 Reviewed-by: Alex Vaghin <[email protected]> Reviewed-by: Brad Fitzpatrick <[email protected]>
FYI, Let's Encrypt has enabled |
Now that x/crypto/acme supports this, this bug is just still open waiting for x/crypto/acme/autocert support now? |
To my understanding, yes.
…On Wed, 18 Jul 2018 at 17:48, Brad Fitzpatrick ***@***.***> wrote:
Now that x/crypto/acme supports this, this bug is just still open waiting
for x/crypto/acme/autocert support now?
—
You are receiving this because you were mentioned.
Reply to this email directly, view it on GitHub
<#25013 (comment)>, or mute
the thread
<https://github.com/notifications/unsubscribe-auth/AEZoBiuW0i6lsqN-6EVcQcbD0kFpNeINks5uH1jVgaJpZM4TgGwv>
.
|
Ok, will hack on a CL now. |
Writing an end-to-end test, so takes a bit longer. Should finish tonight CET. |
Change https://golang.org/cl/125495 mentions this issue: |
Because tls.Config now requires more fields to be set in order for tls-alpn to work, Manager provides a new TLSConfig method for easier setup. This CL also adds a new internal package for end-to-end tests. The package implements a simple ACME CA server. Fixes golang/go#25013 Fixes golang/go#25901 Updates golang/go#17251 Change-Id: I2687ea8d5c445ddafad5ea2cdd36cd4e7d10bc86 Reviewed-on: https://go-review.googlesource.com/125495 Reviewed-by: Brad Fitzpatrick <[email protected]> Run-TryBot: Brad Fitzpatrick <[email protected]> TryBot-Result: Gobot Gobot <[email protected]>
Because tls.Config now requires more fields to be set in order for tls-alpn to work, Manager provides a new TLSConfig method for easier setup. This CL also adds a new internal package for end-to-end tests. The package implements a simple ACME CA server. Fixes golang/go#25013 Fixes golang/go#25901 Updates golang/go#17251 Change-Id: I2687ea8d5c445ddafad5ea2cdd36cd4e7d10bc86 Reviewed-on: https://go-review.googlesource.com/125495 Reviewed-by: Brad Fitzpatrick <[email protected]> Run-TryBot: Brad Fitzpatrick <[email protected]> TryBot-Result: Gobot Gobot <[email protected]>
Because tls.Config now requires more fields to be set in order for tls-alpn to work, Manager provides a new TLSConfig method for easier setup. This CL also adds a new internal package for end-to-end tests. The package implements a simple ACME CA server. Fixes golang/go#25013 Fixes golang/go#25901 Updates golang/go#17251 Change-Id: I2687ea8d5c445ddafad5ea2cdd36cd4e7d10bc86 Reviewed-on: https://go-review.googlesource.com/125495 Reviewed-by: Brad Fitzpatrick <[email protected]> Run-TryBot: Brad Fitzpatrick <[email protected]> TryBot-Result: Gobot Gobot <[email protected]>
Because tls.Config now requires more fields to be set in order for tls-alpn to work, Manager provides a new TLSConfig method for easier setup. This CL also adds a new internal package for end-to-end tests. The package implements a simple ACME CA server. Fixes golang/go#25013 Fixes golang/go#25901 Updates golang/go#17251 Change-Id: I2687ea8d5c445ddafad5ea2cdd36cd4e7d10bc86 Reviewed-on: https://go-review.googlesource.com/125495 Reviewed-by: Brad Fitzpatrick <[email protected]> Run-TryBot: Brad Fitzpatrick <[email protected]> TryBot-Result: Gobot Gobot <[email protected]>
Because tls.Config now requires more fields to be set in order for tls-alpn to work, Manager provides a new TLSConfig method for easier setup. This CL also adds a new internal package for end-to-end tests. The package implements a simple ACME CA server. Fixes golang/go#25013 Fixes golang/go#25901 Updates golang/go#17251 Change-Id: I2687ea8d5c445ddafad5ea2cdd36cd4e7d10bc86 Reviewed-on: https://go-review.googlesource.com/125495 Reviewed-by: Brad Fitzpatrick <[email protected]> Run-TryBot: Brad Fitzpatrick <[email protected]> TryBot-Result: Gobot Gobot <[email protected]>
Because tls.Config now requires more fields to be set in order for tls-alpn to work, Manager provides a new TLSConfig method for easier setup. This CL also adds a new internal package for end-to-end tests. The package implements a simple ACME CA server. Fixes golang/go#25013 Fixes golang/go#25901 Updates golang/go#17251 Change-Id: I2687ea8d5c445ddafad5ea2cdd36cd4e7d10bc86 Reviewed-on: https://go-review.googlesource.com/125495 Reviewed-by: Brad Fitzpatrick <[email protected]> Run-TryBot: Brad Fitzpatrick <[email protected]> TryBot-Result: Gobot Gobot <[email protected]>
This is an alternative to TLS-SNI challenge types.
Not sure when and how it'll be accessible on Let's Encrypt, but posting this here to keep an eye on the progress.
Draft: https://tools.ietf.org/html/draft-ietf-acme-tls-alpn-01
Boulder impl: letsencrypt/boulder#3654
/cc @bradfitz
The text was updated successfully, but these errors were encountered: