dehydrated-bigip-ansible VS acme-dns-server

Compare dehydrated-bigip-ansible vs acme-dns-server and see what are their differences.

dehydrated-bigip-ansible

Ansible based hooks for dehydrated to enable ACME certificate automation for F5 BIG-IP systems (by EquateTechnologies)

acme-dns-server

Simple DNS server for serving TXT records written in Python (by pawitp)
Our great sponsors
  • InfluxDB - Power Real-Time Data Analytics at Scale
  • WorkOS - The modern identity platform for B2B SaaS
  • SaaSHub - Software Alternatives and Reviews
dehydrated-bigip-ansible acme-dns-server
1 2
13 29
- -
0.0 1.8
over 2 years ago almost 2 years ago
Shell Python
Apache License 2.0 MIT License
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

dehydrated-bigip-ansible

Posts with mentions or reviews of dehydrated-bigip-ansible. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2021-08-20.
  • Another free CA as an alternative to Let's Encrypt
    15 projects | news.ycombinator.com | 20 Aug 2021
    > I'm using the acme.sh client but the process will be similar no matter which client you choose to use.

    Always nice to see some variety in clients along side the official Let's Encrypt one.

    While we do use the official Python-based client at works at times, whenever I install it via apt, and it pulls in a whole bunch of dependencies, it's a bit disconcerting to me.

    I'm a bit partial to dehydrated, which is a shell script (works under Bash and Zsh): I find it a lot easier to understand. It's handy to put on Linux/POSIX-based appliances like F5s, where the only prerequisites are Bash, cURL, and OpenSSL (and standard Unix tools like sed, grep, etc):

    * https://devcentral.f5.com/s/articles/lets-encrypt-on-a-big-i...

    * https://github.com/EquateTechnologies/dehydrated-bigip-ansib...

acme-dns-server

Posts with mentions or reviews of acme-dns-server. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2022-02-09.
  • Ask HN: What's your solution for SSL on internal servers?
    8 projects | news.ycombinator.com | 9 Feb 2022
    DNS alias mode:

    * https://dan.langille.org/2019/02/01/acme-domain-alias-mode/

    * https://github.com/acmesh-official/acme.sh/wiki/DNS-alias-mo...

    * https://www.eff.org/deeplinks/2018/02/technical-deep-dive-se...

    You want the name "internal.example.com". In your external DNS you create a CNAME from "_acme-challenge.internal.example.com" and point it to (e.g.) "internal.example.net" or "internal.dns-auth.example.com"

    When you request the certificate you specify the "dns-01" method. The issuer (e.g., LE) will go to the the external DNS server for the look up, see that it is a CNAME and then follow the CNAME/alias, and do the verification at the final hostname.

    So your ACME client has to do a DNS (TXT) record update, which can often be done via various APIs, e.g.:

    * https://github.com/AnalogJ/lexicon

    You can even run your own DNS server locally (in a DMZ?) if your DNS provider does not have an convenient API. There are servers written for this use case:

    * https://github.com/joohoi/acme-dns

    * https://github.com/joohoi/acme-dns-certbot-joohoi

    * https://github.com/pawitp/acme-dns-server

  • Another free CA as an alternative to Let's Encrypt
    15 projects | news.ycombinator.com | 20 Aug 2021
    I already had Bind on the machine so it was logical to add the zone there and utilize nsupdate : https://gist.github.com/kronthto/893715f12cc0b1cda9fcfdbd8dc...

    But what you are suggesting should work just fine aswell - there should be no need for a persistent service. Of course the service would need to run on port 53, so you actually cannot have another nameserver on that machine already, and also require CAP_NET_BIND_SERVICE .

    A quick search lead me to this python project that could be an inspiration: https://github.com/pawitp/acme-dns-server

What are some alternatives?

When comparing dehydrated-bigip-ansible and acme-dns-server you can also consider the following projects:

letsencrypt - Certbot is EFF's tool to obtain certs from Let's Encrypt and (optionally) auto-enable HTTPS on your server. It can also act as a client for any other CA that uses the ACME protocol.

acme-dns - Limited DNS server with RESTful HTTP API to handle ACME DNS challenges easily and securely.

dehydrated - letsencrypt/acme client implemented as a shell-script – just add water

acme.sh - A pure Unix shell script implementing ACME client protocol

acme-dns-certbot-joohoi - Certbot client hook for acme-dns

lego - Let's Encrypt/ACME client and library written in Go

acme-tiny - A tiny script to issue and renew TLS certs from Let's Encrypt

f5-azure-arm-templates - Azure Resource Manager Templates for quickly deploying BIG-IP services in Azure

mkcert - A simple zero-config tool to make locally trusted development certificates with any names you'd like.