-
Notifications
You must be signed in to change notification settings - Fork 5
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Issue generating Cloudflare API credentials #5
Comments
What kind of information are you missing? You need an API token and find the information on the Cloudflare site. The documentation what is needed on the Domino certstore side comes with the DNS provider configuration you imported via DXL. Which certificate are you referring to for conflicts you could run into? Please be very specific what your issue to be able to help you. Thanks Daniel Nashed |
Daniel, Thank you for responding. I apologize if some of my questions/issues seem to be rather elementary - I should start out by saying I am not a full time Domino or network admin and so much of my frustration stems from this lack of experience with this aspect of things. I work for a small company that operates a subscription website for multiple customers using a single wildcarded dns (production site is *.qsihosting.com) hosted on a Domino V9 server. We are in the process of upgrading to V12 on a different server. I am trying to generate a new SSL certificate request using a new Cloudflare domain (qsi-web.com using the CertStore to leverage the built-in LetsEncrypt integration and each cert request submission just drops into Pending Status and doesn't appear to be going anywhere. I have set up the DNS Configuration document for Cloudflare provided here, and created a DNS Provider document with the credentials the DNS config doc says I need, but then when I submit the cert request, nothing happens. I have attached some screenshots. |
You are almost there. You are on a good way.
Once the settings are in place and you request a TLS credentials, CertMgr will trigger that a DNS challenge is used and uses the DNS provider integration. This also works for wildcard certs which match the domain you specify in the account document. When DNS-01 challenges are used and an error occurs, there is a trace document with details. I hope this helps. Else please provide more details what you see and what is happening. |
Yes you are getting closed.
It would be easier to search if you copy the log as text the next time. not as image, please! Did you remove the zone from the config? A token should look like this: aaIZzQSnYNVfWxxtLrLjf2KeeFSOczzehRQyjxxT The error log shows you exactly what is sent to CF and what is returned. The log and what is sent would be helpful if you can't figure it out on your own. I can confirm the API works. I just tested it to get a new certificate for one of my domains to validate. If that does not lead to a success you might need to share your detailed logs and settings offline. |
Here's my last trace report: Configuration: Parameters: URL: Headers: Post: Results: ret_AddStatus = 404 ret_LookupResult = {"result":[],"result_info":{"page":1,"per_page":20,"total_pages":0,"count":0,"total_count":0},"success":true,"errors":[],"messages":[]} ret_LookupStatus = 200 JSON results: |
Glad it worked. Even I don't know why the CNAME made a difference. Your host name would also work with a HTTP-01 challenge. But that would only happen if the DNS-01 integration is triggered. It's really difficult to help if you don't provide the full information. |
You asked another question to support about why the certificate expiration is different. Here is what I get from your server. This isn't a Let's Encrypt certificate. This certificate is a wild card cert. What you have shared from CertStore is a certificate for a single host. Certificates are a difficult topic. Without more details it is really challenging to help. Please provide more details and don't filter what you think is not helpful. I don't understand what you did with the CNAME.
|
Daniel, I really appreciate your assistance and apologize for not giving you all the information you might find helpful. This is not intentional - I'm just not always sure what that might be. I've learned a little more about what Cloudflare is doing. They are applying their own SSL to inbound traffic - if the SSL mode is set to "flexible", it transmits in HTTP to the origin server. If the SSL mode is set to "full", it requires that the DNS challenge succeed. I've enclosed screenshots of these as well as a PDF of the latest wildcard cert request I processed for *.qsi-web.doc (it was successful, so there is no corresponding trace log to send. Would you be willing to do a zoom call or team viewer session to review this? |
With the information you provided, it looks like the wildcard certificate operation worked and you have a valid wildcard certificate. You are using Cloudflare (CF) to protect your server. That means all requests go thru CF and the certificate you see in your browser is a certificate CF manages for you. Depending on the mode on the CF side, you need a back-end certificate from CF. It's a certificate with a long certificate expiration (my one is valid for 15 years), which you import to certstore.nsf to have Domino use the back-end certificate from CF. You can import the key and certificate you get from CF into cerstore.nsf with the import functionality in the certstore.nsf UI. The different modes on CF side are well documented. You really need to decide what you want to do. On the CF side you can configure which DNS name is CF protected. I hope this helps and explains it? |
Thank you for the follow up, Daniel. I'll let you know how it goes. |
Daniel, I got a little sidetracked. I'm looking at this now and I'm not sure whether I should be importing this into the existing request, replacing the initial request, or adding a new request. I've looked at each of these options and none seem to be an exact fit. The Origin CA certificate generates an Origin Certificate key and a separate private key. I looked at the existing request in our Cert Store, and there is an action button to Import TLS credentials; however, the resulting prompt asks only for a file name and a password. I looked on the form at the Security/Keys and Manual tabs and didn't see anything that looked like a good match either. Can you tell me where the Origin CA certifier info I just generated at Cloudflare needs to be placed in the Cert Store? |
This should create a new TLS Credentials document for this CF certificate. I hope this explains it and the next questions you would ask about it once the import is done. |
Hello,
I am attempting to create the DNS provider record for a Cloudshare domain (intended for use with wildcards) using API credentials but am not sure where the corresponding info is for the API token. Also, Cloudshare is applying its own certificate and I am not sure whether that can be causing me issues in processing my cert request in Domino 12 using the Cert Store. Any help/direction you can provide would be most helpful.
The text was updated successfully, but these errors were encountered: