Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support for ECDSA certificates in the native client #65

Open
ruslandoga opened this issue Jun 16, 2024 · 2 comments · May be fixed by #69
Open

Support for ECDSA certificates in the native client #65

ruslandoga opened this issue Jun 16, 2024 · 2 comments · May be fixed by #69

Comments

@ruslandoga
Copy link
Contributor

ruslandoga commented Jun 16, 2024

Certbot and some other ACME clients have switched to ECDSA by default some time ago. Currently, alg is hardcoded in SiteEncrypt's native client. Thoughts on making it configurable or even better, guessed from the private key provided?


Some notable discussions:

@sasa1977
Copy link
Owner

Certbot and some other ACME clients have switched to ECDSA

It would make sense to use the same defaults as the other clients.

Thoughts on making it configurable

Also sounds sensible.

even better, guessed from the private key provided

Which provided key? IIRC we don't accept any key as the input.

Anyway, contributions in this are are welcome :-)

@ruslandoga
Copy link
Contributor Author

ruslandoga commented Jun 19, 2024

Which provided key? IIRC we don't accept any key as the input.

I was thinking about the account_key here

def new_session(directory_url, account_key, http_opts \\ []) do
but yeah, it would need to be configured for SiteEncrypt anyway so we can just get alg from the config instead of guessing it from the key. I'll try to prepare a PR tomorrow this weekend early later next week!

@ruslandoga ruslandoga linked a pull request Jun 28, 2024 that will close this issue
5 tasks
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging a pull request may close this issue.

2 participants