New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
GSS-TSIG support for rfc2136 DNS addon #7370
Comments
In order to do this, I think we'd need GSS-TSIG support to be added to https://github.com/rthalley/dnspython or to switch to another DNS library entirely. |
One year no progress, let’s close this? |
Given that dnspython now supports GSS-TSIG, can we get working on this? |
I would also be really interested in this as it saves me setting up additional keys in bind for each host, is there any outlook as to when this could be available or is no-one working on this yet? |
I have no idea if I'll ever finish this, but it might be useful for someone else working on certbot#7370
We've made a lot of changes to Certbot since this issue was opened. If you still have this issue with an up-to-date version of Certbot, can you please add a comment letting us know? This helps us to better see what issues are still affecting our users. If there is no activity in the next 30 days, this issue will be automatically closed. |
This issue is a feature request for GSS-TSIG support. It has not yet been implemented, although a draft pull request exists. It should probably stay open until a decision is made in the PR either way. |
Thanks for chiming in! |
We've made a lot of changes to Certbot since this issue was opened. If you still have this issue with an up-to-date version of Certbot, can you please add a comment letting us know? This helps us to better see what issues are still affecting our users. If there is no activity in the next 30 days, this issue will be automatically closed. |
This is a feature request for something that, AFAICT, has not yet been implemented, so please keep it open. |
Please add support to certbot-dns-rfc2136 for GSS-TSIG: that is, using Kerberos tickets for updating the DNS, as specified by RFC 3645.
Thanks,
The text was updated successfully, but these errors were encountered: