Manage all types of time series data in a single, purpose-built database. Run at any scale in any environment in the cloud, on-premises, or at the edge. Learn more →
Acme.sh Alternatives
Similar projects and alternatives to acme.sh
-
dehydrated
letsencrypt/acme client implemented as a shell-script – just add water
-
-
SonarLint
Clean code begins in your IDE with SonarLint. Up your coding game and discover issues early. SonarLint is a free plugin that helps you find & fix bugs and security issues from the moment you start writing code. Install from your favorite IDE marketplace today.
-
Nginx Proxy Manager
Docker container for managing Nginx proxy hosts with a simple, powerful interface
-
acme-dns
Limited DNS server with RESTful HTTP API to handle ACME DNS challenges easily and securely.
-
letsencrypt
Certbot is EFF's tool to obtain certs from Let's Encrypt and (optionally) auto-enable HTTPS on your server. It can also act as a client for any other CA that uses the ACME protocol.
-
Caddy
Fast and extensible multi-platform HTTP/1-2-3 web server with automatic HTTPS
-
certify
Professional ACME Client for Windows. Certificate Management UI, powered by Let's Encrypt and compatible with all ACME v2 CAs. Download from certifytheweb.com
-
InfluxDB
Collect and Analyze Billions of Data Points in Real Time. Manage all types of time series data in a single, purpose-built database. Run at any scale in any environment in the cloud, on-premises, or at the edge.
-
pterodactyl-installer
:bird: Unofficial installation scripts for Pterodactyl Panel
-
-
-
-
-
-
-
docker-swag
Nginx webserver and reverse proxy with php support and a built-in Certbot (Let's Encrypt) client. It also contains fail2ban for intrusion prevention.
-
signal-desktop
A community-maintained package to easily install Signal Desktop on Linux (by snapcrafters)
-
-
mkcert
A simple zero-config tool to make locally trusted development certificates with any names you'd like.
-
-
Mergify
Updating dependencies is time-consuming.. Solutions like Dependabot or Renovate update but don't merge dependencies. You need to do it manually while it could be fully automated! Add a Merge Queue to your workflow and stop caring about PR management & merging. Try Mergify for free.
acme.sh reviews and mentions
-
Caddy is the first and only web server to use HTTPS automatically and by default
like https://github.com/acmesh-official/acme.sh/wiki/Stateless-Mo...
If DNS-01 is not an option or to complicated, this saves you from exposing a host to the internet for no good reason.
-
Where do you get/setup certificates from for your https/ssl?
Caddy where possible, and acme.sh or lego where not.
-
Internal Server Error when proxy host directs to router
The SSL certificate for my wildcard domain is currently managed by the acme.sh script running as a Docker container until the issue with NPM and Azure DNS certificate management is resolved.
-
ACME pkg v0.7.4 includes automatic renewal/issuance of Google Domain certs!
acme.sh has this now in the mainline... https://github.com/acmesh-official/acme.sh/wiki/dnsapi2#dns_googledomains
acme.sh pkg v0.7.4 is available via the package manager, as of 2 days ago. Among others, it includes implementing the "new" Google Domain DNS API allowing for automatic renewal of Google Domain certs. Simple matter of generating your API key on Google Domains and pasting it into the SAN List dialog.
- acme.sh runs arbitrary commands from a remote server · Issue #4659 · acmesh-official/acme.sh
- Zero day RCE
- acme.sh runs arbitrary commands from a remote server
-
Acme.sh runs arbitrary commands from a remote server
Looks like they are issuing under a sub-CA of "ssl.com" according to https://github.com/acmesh-official/acme.sh/issues/4659#issue...
Interestingly, the mozilla dev-security-policy group seems to contain a recent discussion about including "ssl.com" in the root store here https://groups.google.com/a/mozilla.org/g/dev-security-polic...
Curious to know if this could, maybe it should, have ripple effects to the various SSL Root CA programs. Having someone run a subCA that actually exploits an RCE against ACME clients doesn't seem very trustworthy, and any CA enabling this behaviour should probably be kicked out of the trust stores?
Someone posted a comment on github claiming they are the founder of Quantum (the sub CA) and that they provide the HiCA service. So it does sound like there is a closer link here than your comment would indicate:
https://github.com/acmesh-official/acme.sh/issues/4659#issue...
-
A note from our sponsor - InfluxDB
www.influxdata.com | 25 Sep 2023
Stats
acmesh-official/acme.sh is an open source project licensed under GNU General Public License v3.0 only which is an OSI approved license.
The primary programming language of acme.sh is Shell.