dehydrated-bigip-ansib VS acme-dns-server

Compare dehydrated-bigip-ansib vs acme-dns-server and see what are their differences.

acme-dns-server

Simple DNS server for serving TXT records written in Python (by pawitp)
InfluxDB - Power Real-Time Data Analytics at Scale
Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
www.influxdata.com
featured
SaaSHub - Software Alternatives and Reviews
SaaSHub helps you find the best software and product alternatives
www.saashub.com
featured
dehydrated-bigip-ansib acme-dns-server
1 2
- 29
- -
- 1.8
- almost 2 years ago
Python
- MIT License
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

dehydrated-bigip-ansib

Posts with mentions or reviews of dehydrated-bigip-ansib. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2021-08-20.
  • Another free CA as an alternative to Let's Encrypt
    15 projects | news.ycombinator.com | 20 Aug 2021
    > I'm using the acme.sh client but the process will be similar no matter which client you choose to use.

    Always nice to see some variety in clients along side the official Let's Encrypt one.

    While we do use the official Python-based client at works at times, whenever I install it via apt, and it pulls in a whole bunch of dependencies, it's a bit disconcerting to me.

    I'm a bit partial to dehydrated, which is a shell script (works under Bash and Zsh): I find it a lot easier to understand. It's handy to put on Linux/POSIX-based appliances like F5s, where the only prerequisites are Bash, cURL, and OpenSSL (and standard Unix tools like sed, grep, etc):

    * https://devcentral.f5.com/s/articles/lets-encrypt-on-a-big-i...

    * https://github.com/EquateTechnologies/dehydrated-bigip-ansib...

acme-dns-server

Posts with mentions or reviews of acme-dns-server. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2022-02-09.
  • Ask HN: What's your solution for SSL on internal servers?
    8 projects | news.ycombinator.com | 9 Feb 2022
    DNS alias mode:

    * https://dan.langille.org/2019/02/01/acme-domain-alias-mode/

    * https://github.com/acmesh-official/acme.sh/wiki/DNS-alias-mo...

    * https://www.eff.org/deeplinks/2018/02/technical-deep-dive-se...

    You want the name "internal.example.com". In your external DNS you create a CNAME from "_acme-challenge.internal.example.com" and point it to (e.g.) "internal.example.net" or "internal.dns-auth.example.com"

    When you request the certificate you specify the "dns-01" method. The issuer (e.g., LE) will go to the the external DNS server for the look up, see that it is a CNAME and then follow the CNAME/alias, and do the verification at the final hostname.

    So your ACME client has to do a DNS (TXT) record update, which can often be done via various APIs, e.g.:

    * https://github.com/AnalogJ/lexicon

    You can even run your own DNS server locally (in a DMZ?) if your DNS provider does not have an convenient API. There are servers written for this use case:

    * https://github.com/joohoi/acme-dns

    * https://github.com/joohoi/acme-dns-certbot-joohoi

    * https://github.com/pawitp/acme-dns-server

  • Another free CA as an alternative to Let's Encrypt
    15 projects | news.ycombinator.com | 20 Aug 2021
    I already had Bind on the machine so it was logical to add the zone there and utilize nsupdate : https://gist.github.com/kronthto/893715f12cc0b1cda9fcfdbd8dc...

    But what you are suggesting should work just fine aswell - there should be no need for a persistent service. Of course the service would need to run on port 53, so you actually cannot have another nameserver on that machine already, and also require CAP_NET_BIND_SERVICE .

    A quick search lead me to this python project that could be an inspiration: https://github.com/pawitp/acme-dns-server

What are some alternatives?

When comparing dehydrated-bigip-ansib and acme-dns-server you can also consider the following projects:

acme-dns - Limited DNS server with RESTful HTTP API to handle ACME DNS challenges easily and securely.

acme-tiny - A tiny script to issue and renew TLS certs from Let's Encrypt

dehydrated - letsencrypt/acme client implemented as a shell-script – just add water

lexicon - Manipulate DNS records on various DNS providers in a standardized way.

acme-dns-certbot-joohoi - Certbot client hook for acme-dns

acme.sh - A pure Unix shell script implementing ACME client protocol

lego - Let's Encrypt/ACME client and library written in Go

letsencrypt - Certbot is EFF's tool to obtain certs from Let's Encrypt and (optionally) auto-enable HTTPS on your server. It can also act as a client for any other CA that uses the ACME protocol.

mkcert - A simple zero-config tool to make locally trusted development certificates with any names you'd like.