Hi again everyone. It seems the discussion got slightly derailed bu unrelated issues. Lets get back to the main topic.
There is one last resort to make sure old systems can access DA panel and websites. That is to dropping LetsEncrypt completely in favor of a different certificate provider, for example ZeroSSL.
We have prepared an early tech preview of a ZeroSSL support. For this to work we released a new
lego
version (capable of issuing ZeroSSL certificates) and new
letsencrypt
version
v2.0.24
. Participation in this early preview is controlled by the existence of
/root/.zerossl
file. If this file is present DA will try issuing cert from ZeroSSL, if this file is absent everything will work as before (certs issued from LetsEncrypt).
If you would like to try it out please do the following:
Code:
# /usr/local/directadmin/custombuild/build update
# /usr/local/directadmin/custombuild/build lego
# /usr/local/directadmin/custombuild/build letsencrypt
# touch /root/.zerossl
# /usr/local/directadmin/scripts/letsencrypt.sh request server.name.example.net
The steps are actually doing:
- Downloading latest package versions via custombuild
- Installing latest
lego
package (should be version 953d5c85145b6a2b9a52f2d919faf23e04a359b3
)
- Installing latest
letsencrypt
package (should be version v2.0.24
)
- Enabling participation in early ZeroSSL certs support experiment
- Renewing main server certificate
If everything works as expected testing server certificate with openssl should show ZeroSSL certificate:
Code:
# openssl s_client -connect example.net:2222 -servername example.net
...
---
Certificate chain
0 s:/CN=example.net
i:/C=AT/O=ZeroSSL/CN=ZeroSSL ECC Domain Secure Site CA
1 s:/C=AT/O=ZeroSSL/CN=ZeroSSL ECC Domain Secure Site CA
i:/C=US/ST=New Jersey/L=Jersey City/O=The USERTRUST Network/CN=USERTrust ECC Certification Authority
2 s:/C=US/ST=New Jersey/L=Jersey City/O=The USERTRUST Network/CN=USERTrust ECC Certification Authority
i:/C=GB/ST=Greater Manchester/L=Salford/O=Comodo CA Limited/CN=AAA Certificate Services
---
...
Please note that you might need to use different command for main cert renewal if you want certificate to include multiple aliases as was pointed out by
@Richard G earlier.
If
/root/.zerossl
file is present all certs issued will use ZeroSSL provider (existing LetsEncrypt certificates will be replaced by ZeroSSL certificates on renewal).
This solution is intended for those who really need to maintain websites for old clients. Please report if you tried it out and it helped. We expect this experimental ZeroSSL mode to be dropped or replaced by proper ZeroSSL switch in GUI in the future depending on how this experiment goes.