Letsencrypt is nowadays very popular certificates authority.
It is standard de-facto for most of situations when you need green sealed certificate on your environment. New version of the API (v2) provides very nice way to issue wildcard certificates using DNS validation.
Although it is not recommended to put read/write dns credentials on a such environment, there might be exception that forces you to do so on a temporary basis.
Workaround below provides way to limit write scope of the credentials, when your domain is served by AWS Route53.
Let's assume we want to create wildcard certificate for our staging environment
*.staging.yourdomain.com
Create another public hosted zone for the domain _acme-challenge.staging.yourdomain.com
I know, you are probably thinking "but that's not a domain!", but in the relevant sense,
it actually is still a domain, just four level one.
Route 53 will assign 4 new nameservers to this new hosted zone. Make a note of those servers.
You will get something like
ns-1918.awsdns-47.co.uk.
ns-1211.awsdns-23.org.
ns-626.awsdns-14.net.
ns-126.awsdns-15.com.
Return to your original hosted zone, and create a record for _acme-challenge.staging.yourdomain.com
of type NS. As a value you will use to create this record use those 4 nameservers that Route 53 assigned to the new hosted zone, one per line.
Important! Do not change any of the existing NS records in either of the zones.
What we have implemented by this step is called a delegation - i.e. you are delegating authority for staging.yourdomain.com
subdomain to a different hosted zone, which you will notice was automatically assigned a completely different set of 4 Route 53 servers from those that handle your parent domain.
You can now create a new record in the root of the new hosted zone, and when you do a DNS query for _acme-challenge.staging.yourdomain.com, the answer returned will be the answer from the new hosted zone.
Now, you can give your script permission only to modify records in the new zone, and it will be unable to modify anything in the parent zone, because you gave it no permissions, there. So we approaching to the next step
Now we can prepare AWS policy with fine grained permissions
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [
"route53:ChangeResourceRecordSets"
],
"Resource": [
"arn:aws:route53:::hostedzone/{HOSTEDZONEID}"
]
},
{
"Effect": "Allow",
"Action": [
"route53:ListHostedZonesByName"
],
"Resource": [
"*"
]
}
]}
and link this policy to appropriate IAM user, and get his access credentials.
Corresponding terraform script might be as following (always check to most recent documentation https://certbot-dns-route53.readthedocs.io/en/stable/ )
data "aws_route53_zone" "acme" {
name = "_acme-challenge.staging.yourdomain.com."
}
resource "aws_iam_policy" "allow_writing_acme_zone" {
# ... other configuration ...
name = "allow_writing_staging_acme_zone"
policy = "${data.aws_iam_policy_document.allow_writing_acme_zone.json}"
}
data "aws_iam_policy_document" "allow_writing_acme_zone" {
statement {
actions = ["route53:ChangeResourceRecordSets"]
resources = ["arn:aws:route53:::hostedzone/${data.aws_route53_zone.acme.zone_id}"]
effect = "Allow"
}
statement {
actions = ["route53:GetHostedZone"]
resources = ["arn:aws:route53:::hostedzone/${data.aws_route53_zone.acme.zone_id}"]
effect = "Allow"
}
statement {
actions = ["route53:ListResourceRecordSets"]
resources = ["arn:aws:route53:::hostedzone/${data.aws_route53_zone.acme.zone_id}"]
effect = "Allow"
}
statement {
actions = ["route53:ChangeResourceRecordSets"]
resources = ["arn:aws:route53:::hostedzone/${data.aws_route53_zone.acme.zone_id}"]
effect = "Allow"
}
statement {
actions = ["route53:GetChange"]
resources = ["*"]
effect = "Allow"
}
statement {
actions = ["route53:ListHostedZones"]
resources = ["*"]
effect = "Allow"
}
}
resource "aws_iam_user" "acme-writer" {
name = "acme-domain-writer"
}
resource "aws_iam_user_policy_attachment" "acme-writer-policy" {
user = "${aws_iam_user.acme-writer.name}"
policy_arn = "${aws_iam_policy.allow_writing_acme_zone.arn}"
}
Setup AWS credentials We now need to put the AWS credentials on the server so the plugin can use them. I run all my certbot commands out of the default user’s home folder, your setup might be different.
In the home folder create an .aws folder and inside that create a text file with the name
credentials
with the following contents.
[default]
aws_access_key_id=XXXXXX
aws_secret_access_key=XXXX/XXXXX
Replace the placeholders with the access key and secret access key that you just saved from AWS and fill them in.
Once created, check it was configured properly
aws sts get-caller-identity
{
"Account": "XXX",
"UserId": "YYYYYYYYYYYYYY",
"Arn": "arn:aws:iam::XXX:user/acme-domain-writer"
}
Next step would be, naturally, generating the certificate
Install tool of your choice, for example, classic certbot
(examples below are given for ubuntu family)
sudo apt-get update
sudo apt-get install software-properties-common
sudo add-apt-repository universe
sudo add-apt-repository ppa:certbot/certbot
sudo apt-get update
sudo apt-get install certbot python-certbot-nginx python3-certbot-dns-route53
or using their up-to-date script
wget https://dl.eff.org/certbot-auto
chmod a+x ./certbot-auto
sudo ./certbot-auto
certbot certonly -d staging.yourdomain.com -d *.staging.yourdomain.com --dns-route53 --logs-dir ~/letsencrypt/log/ --config-dir ~/letsencrypt/config/ --work-dir /home/username/letsencrypt/work/ -m [email protected] --agree-tos --non-interactive --server https://acme-v02.api.letsencrypt.org/directory
If you see output like below, you are done:
Found credentials in shared credentials file: ~/.aws/credentials
Plugins selected: Authenticator dns-route53, Installer None
Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org
Obtaining a new certificate
Performing the following challenges:
dns-01 challenge for staging.yourdomain.com
dns-01 challenge for staging.yourdomain.com
Starting new HTTPS connection (1): route53.amazonaws.com
Waiting 10 seconds for DNS changes to propagate
Waiting for verification...
Cleaning up challenges
Resetting dropped connection: route53.amazonaws.com
Resetting dropped connection: acme-v02.api.letsencrypt.org
Now let's ensure, that our domain will be prolonged
certbot renew --logs-dir ~/letsencrypt/log/ --config-dir ~/letsencrypt/config/ --work-dir ~/letsencrypt/work/
If you want to setup cron, and you have specified custom log, config, work dirs - make sure to specify full path in crontab.
crontab -e
43 6 * * * certbot renew --post-hook "service nginx restart" --logs-dir /home/user/letsencrypt/log/ --config-dir /home/user/letsencrypt/config/ --work-dir /home/user/letsencrypt/work/
Your certificates will be located under config dir
ls config/live/staging.yourdomain.com/
README cert.pem chain.pem fullchain.pem privkey.pem
But my own preference is pure shell acme.sh
Acme.sh https://github.com/Neilpang/acme.sh - it is another extra cool tool written purely in shell. It supports number of dns providers in form of shell(!) plugins https://github.com/Neilpang/acme.sh/tree/master/dnsapi
Each plugin has comprehensive documentation on configuring https://github.com/Neilpang/acme.sh/wiki/dnsapi
For Route53, you will need to export your credentials
export AWS_ACCESS_KEY_ID=XXXXXXXXXX
export AWS_SECRET_ACCESS_KEY=XXXXXXXXXXXXXXX
With acme.sh
acme.sh --issue --dns dns_aws -d staging.yourdomain.com -d "*.staging.yourdomain.com"
[середа, 29 травня 2019 19:58:01 +0200] Multi domain='DNS:staging.yourdomain.com,DNS:*.staging.yourdomain.com'
[середа, 29 травня 2019 19:58:01 +0200] Getting domain auth token for each domain
[середа, 29 травня 2019 19:58:03 +0200] Getting webroot for domain='staging.yourdomain.com'
[середа, 29 травня 2019 19:58:03 +0200] Getting webroot for domain='*.staging.yourdomain.com'
[середа, 29 травня 2019 19:58:03 +0200] Adding txt value: GvaPZqTUMceQVt8yFl4IkW0ZqJ22-680Du-7BLfTcVc for domain: _acme-challenge.staging.yourdomain.com
[середа, 29 травня 2019 19:58:04 +0200] Getting existing records for _acme-challenge.staging.yourdomain.com
[середа, 29 травня 2019 19:58:05 +0200] TXT record updated successfully.
[середа, 29 травня 2019 19:58:05 +0200] The txt record is added: Success.
[середа, 29 травня 2019 19:58:05 +0200] Adding txt value: txy1JYnOGAWpT1rQ8_U99Ird-Pq-P0iWYzixGPPQIvw for domain: _acme-challenge.staging.yourdomain.com
[середа, 29 травня 2019 19:58:06 +0200] Getting existing records for _acme-challenge.staging.yourdomain.com
[середа, 29 травня 2019 19:58:07 +0200] TXT record updated successfully.
[середа, 29 травня 2019 19:58:07 +0200] The txt record is added: Success.
[середа, 29 травня 2019 19:58:07 +0200] Let's check each dns records now. Sleep 20 seconds first.
...
[середа, 29 травня 2019 19:58:28 +0200] All success, let's return
[середа, 29 травня 2019 19:58:28 +0200] Verifying: staging.yourdomain.com
[середа, 29 травня 2019 19:58:31 +0200] Success
[середа, 29 травня 2019 19:58:31 +0200] Verifying: *.staging.yourdomain.com
[середа, 29 травня 2019 19:58:34 +0200] Success
...
[середа, 29 травня 2019 19:58:39 +0200] Your cert is in /home/slavko/.acme.sh/staging.yourdomain.com/staging.yourdomain.com.cer
[середа, 29 травня 2019 19:58:39 +0200] Your cert key is in /home/slavko/.acme.sh/staging.yourdomain.com/staging.yourdomain.com.key
[середа, 29 травня 2019 19:58:39 +0200] The intermediate CA cert is in /home/slavko/.acme.sh/staging.yourdomain.com/ca.cer
[середа, 29 травня 2019 19:58:39 +0200] And the full chain certs is there: /home/slavko/.acme.sh/staging.yourdomain.com/fullchain.cer
Renewing is also straightforward - just create cron similar to
0 0 * * * "/home/user/.acme.sh"/acme.sh --cron --home "/home/user/.acme.sh" > /dev/null
Use certificates in your webserver
Terraform snippets might be found at https://github.com/Voronenko/route53-letsencrypt-policy/ ; Ansible role assisting you with install on target server can be found here: https://github.com/softasap/sa-acme-sh