-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
9. Create tsig key files in the ~/leutmdns/tsig/ folder. #3
Comments
File name format: K_acme-challenge.mydomainname.com.+157+1.private For using DynDNS, you only one file for each domain you have registered, ie kyse.org and kyse.net. Thre is no need to setup a file for each subdomain unless you have something setup with your DNS provider where you're paying or a separate service for that subdomain DNS and you end up with a separate HMAC key to control it. This is only related to communicating with you DNS provider. Inside the file: key "keyName" {
algorithm hmac-md5;
secret "keyHMAC";
}; For these, again if using DynDNS, you can find these details once logged in at the DynDNSS TSIG https://account.dyn.com/profile/tsig.html page. By the way, I'll probably end up hitting this up again after the 27th of Feb to upgrade and ensure it works with latest dehydrated, an also to ensure or add support for the new wildcard features they're releasing with their new API version. |
Im not using dyndns.. just a BIND9 dns server i own.
this is my setup, no idea what HMAC means.. but im geting this error that may not be related to this:
|
That looks like it's trying to use the wrong openssl config. I ran into an issue similar for a bit till I could get dehydrated to update their distribution to include a missing config file location. Either that or your openssl installation doesn't like the x509 v3 settings I am shipping with the openssl.cnf file. |
I gave up trying to fix it, and went with a more unsecured approach.. allowing the BIND server to allow-update from the IP of the sophos.. also commented all that :/ |
Not sure I follow that last bit. You're saying the $zone variable contains "mail.domain" instead of just "domain"? Is your tsig zone setup where you have auth with the key for mail.domain.com and another for domain.com? I might have to expand it to support something like that, for me with dyndns my testing just included having domain.com as the target zone. Thus any line in domains.txt would query against one of the tsig files for that particular zone. FYI, looks like the wildcard cert got pushed back with no prod date available now. I will spend some time this weekend working towards the staging api endpoints to check if it's in a working state with this library. |
this has nothing to do with the tsig.. im not even using that part, commented it all since i skiped the tsig and went straight using alllow-update from the ip of the sophos.. this you cant do with dyndns as you don't control the bind server.. so dont worry about it.. you are not doing this.. you are using mail.domain.com as the zone and this fails on most(if not all) DNS server. |
Actually, I was following these instructions (https://dyn.com/updater/tsig/) regarding nsupdate syntax. I'll try and spend some time with the syntax you provided to see if I can incorporate it to support what you're working with. Might be a min, I want to focus on upgrading to support wildcard support and the AMCE v2 endpoint. |
Mind explaining with an example what are we supposed to name the files and what to put inside?
The text was updated successfully, but these errors were encountered: