| ▲ | mmh0000 4 hours ago | ||||||||||||||||||||||
I really like and hate this at the same time. Years ago, I had a really fubar shell script for generating the DNS-01 records on my own (non-cloud) run authoritative nameserver. It "worked," but its reliability was highly questionable. I like this DNS-PERSIST fixes that. But I don't understand why they chose to include the account as a plain-text string in the DNS record. Seems they could have just as easily used a randomly generated key that wouldn't mean anything to anyone outside Let's Encrypt, and without exposing my account to every privacy-invasive bot and hacker. | |||||||||||||||||||||||
| ▲ | Ajedi32 2 hours ago | parent | next [-] | ||||||||||||||||||||||
> they could have just as easily used a randomly generated key Isn't that pretty much what an accounturi is in the context of ACME? Who goes around manually creating Let's Encrypt accounts and re-using them on every server they manage? | |||||||||||||||||||||||
| ▲ | ragall 4 hours ago | parent | prev [-] | ||||||||||||||||||||||
Those who choose to use DNS-PERSIST-01 should fully commit to automation and create one LetsEncrypt account per FQDN (or at least per loadbalancer), using a UUID as username. | |||||||||||||||||||||||
| |||||||||||||||||||||||