-
Notifications
You must be signed in to change notification settings - Fork 264
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add support for the Automatic Certificate Management Environment to warp #463
Comments
I'm strongly interested in let's encrypt, too.
For this, how should we modify warp-tls? |
I have been thinking about that for a while.
Another problem might be certificate renewal and integration w/ HPKP. To be reliable and cause no additional problems, checking the status should be done regulary. For example on startup and then scheduling a thread to renew the certificate and modify the HPKP-Headers as indicated, which schedules another one for actual switching out of certificates. |
As Let's encrypt started it's open beta in the meanwhile, I'd like to bump this again. Probably a good time, too, to keep an eye on new hackage package releases may helping us out by implementing at least part of the features. |
My current concern is SNI. If I understand correctly we need to issue two certificates for, say, example.com and www.example.com. The current SNI support by the tls library is poor(haskell-tls/hs-tls#103), I believe. We enhance SNI both in WarpTLS and tls. |
Anyway, I will start to implement the support of let's encrypt with a single certificate. |
I think the most natural way to perform the ACME challenge is the I just finished implementing something similar in Python for the Twisted networking framework (https://github.com/mithrandi/txacme); I think this would be an excellent thing to have in the Warp ecosystem. |
|
I am using https://github.com/lukas2511/dehydrated with the DNS challenge for keter bundles. I would need to add reload certificate on file change. |
Since Let's Encrypt will start it's public beta in early december, an ACME-enabled CA would be available. Adding support for the protocoll to warp in time, as does the Let's Encrypt Client with Apache, would be a good statement pro https.
I could imagine warp default to launching warp-tls alongside http and self-requesting an appropriate certificate from any free, trusted DV-CA as it sees fit (no certificate avaiable, certificate about to expire).
This could enable https working out-of-the-box.
At least a configuration flag for warp-tls would be great that could toggle this behavior.
The only problem I see at the moment is to let warp-tls know the intended domain names it should ask for certificates for.
The text was updated successfully, but these errors were encountered: