FreeBSD Manual Pages
LFACME-KERBEROS(7) Miscellaneous Information Manual LFACME-KERBEROS(7) NAME lfacme-kerberos -- validate an ACME challenge via GSS-TSIG DNS updates SYNOPSIS In domains.conf(5): domain challenge=kerberos DESCRIPTION The lfacme-kerberos challenge hook will respond to an ACME domain vali- dation using a DNS-based "dns-01" authorization with GSS-TSIG Dynamic DNS updates. To use this challenge hook, configure one or more domains with "challenge=kerberos" in domains.conf(5). The "dns-01" challenge expects the authorization token to be created as a TXT record at the DNS name "_acme-challenge.domain". When lfacme-kerberos responds to the challenge, it will use nsupdate(1) with the -g flag to create this token. The DNS update will be sent to the zone's master server, as determined by the MNAME field in the SOA record. Before sending the update, lfacme-kerberos will retrieve a Kerberos ticket using kinit(1) for the principal configured by LFACME_KERBEROS_PRINCIPAL in acme.conf(5). CONFIGURATION The lfacme-kerberos challenge hook supports the following configuration options in acme.conf(5): LFACME_KERBEROS_PRINCIPAL The Kerberos principal to authenticate as when sending the DNS update. The default value is "host/$(hostname)", which assumes a default realm has been configured in /etc/krb5.conf. Explic- itly configuring the principal is recommended, but not re- quired. LFACME_KERBEROS_KEYTAB The keytab used to issue the Kerberos ticket. This must con- tain a key for the principal configured by LFACME_KERBEROS_PRINCIPAL. The default value is /etc/krb5.keytab. LFACME_KERBEROS_KINIT Path to the kinit(1) program. If not specified, $PATH will be searched. LFACME_DNS_DIG Path to the dig(1) program. If not specified, $PATH will be searched. LFACME_DNS_NSUPDATE Path to the nsupdate(1) program. If not specified, $PATH will be searched. DNS SERVER CONFIGURATION For lfacme-kerberos to work, the DNS server must be configured to ac- cept Kerberos-authenticated Dynamic DNS updates. Using ISC BIND, this can be achieved using a zone update-policy. For example, to allow any host in the "EXAMPLE.ORG" Kerberos realm to issue certificates for its own hostname (and subdomains thereof): update-policy { grant EXAMPLE.ORG krb5-selfsub . TXT; }; Or to allow a specific host to issue certificates for a different DNS label: update-policy { grant "host/server.example.org@EXAMPLE.ORG" name _acme-challenge.www.example.org. TXT; }; Suitable configuration for other DNS servers (e.g., the Microsoft Win- dows DNS server) is left as an exercise for the reader. SEE ALSO acme.conf(5), domains.conf(5), kinit(1), lfacme-renew(8), nsupdate(1) FreeBSD ports 15.0 June 4, 2025 LFACME-KERBEROS(7)
NAME | SYNOPSIS | DESCRIPTION | CONFIGURATION | DNS SERVER CONFIGURATION | SEE ALSO
Want to link to this manual page? Use this URL:
<https://man.freebsd.org/cgi/man.cgi?query=lfacme-kerberos&sektion=7&manpath=FreeBSD+Ports+15.0>
