INWX DNS Authenticator plugin for Certbot
INWX DNS authenticator plugin for certbot
- certbot (>=0.15)
For older Ubuntu distributions check out this PPA: ppa:certbot/certbot
- First install the plugin:
- Without dependencies (if using certbot from your distribution repository):
python3 setup.py develop --no-deps
- With dependencies (not recommended if using certbot from your distribution repositories):
python3 setup.py install
- Via PIP:
pip install certbot-dns-inwx
- With certbot-auto (needs to be reinstalled after every certbot-auto update):
/opt/eff.org/certbot/venv/bin/pip install .
- Configure it with your INWX API Login Details:
with the following content (also see inwx.cfg of the repository):
The shared secret is your INWX 2FA OTP code. It is shown to you when setting up the 2FA. It is not the 6 digit code you need to enter when siging in. If you are not using 2FA, simply keep the value the way it is.
certbot_dns_inwx:dns_inwx_url = https://api.domrobot.com/xmlrpc/ certbot_dns_inwx:dns_inwx_username = your_username certbot_dns_inwx:dns_inwx_password = your_password certbot_dns_inwx:dns_inwx_shared_secret = your_shared_secret optional
- Make sure the file is only readable by root! Otherwise all your domains might be in danger:
chmod 0600 /etc/letsencrypt/inwx.cfg
Request new certificates via a certbot invocation like this:
certbot certonly -a certbot-dns-inwx:dns-inwx -d sub.domain.tld -d *.wildcard.tld
Renewals will automatically be performed using the same authenticator and credentials by certbot.
Command Line Options
--certbot-dns-inwx:dns-inwx-propagation-seconds CERTBOT_DNS_INWX:DNS_INWX_PROPAGATION_SECONDS The number of seconds to wait for DNS to propagate before asking the ACME server to verify the DNS record. (default: 60) --certbot-dns-inwx:dns-inwx-credentials CERTBOT_DNS_INWX:DNS_INWX_CREDENTIALS Path to INWX account credentials INI file (default: /etc/letsencrypt/inwx.cfg)
certbot --help certbot-dns-inwx:dns-inwx for further information.
This plugin supports redirections on the DNS-01 validation records using CNAME records.
For example, you can have a domain
a.tld which is not necessarily managed by INWX and possibly may not be automated via certbot. Additionally, you have a domain
b.tld which is managed by INWX.
An easy solution to automate certificate retrieval for
a.tld is to add a CNAME record for the name
a.tld which is pointing to i.e.
_a_validation.b.tld in your providers web interface.
A command like
certbot -a certbot-dns-inwx:dns-inwx -d a.tld will then make certbot place its validation token at
_a_validation.b.tld via INWX and your validation for
NOTE: This is an optional feature and requires dnspython to be installed. To install it use your distribution repository or i.e.
pip install dnspython.
While the plugin itself is licensed according to the Apache License v2.0 the contained INWX DomRobot Client by INWX is licensed according to the MIT License.
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
|Filename, size & hash SHA256 hash help||File type||Python version||Upload date|
|certbot_dns_inwx-2.1.1-py2.py3-none-any.whl (12.4 kB) Copy SHA256 hash SHA256||Wheel||py2.py3|
|certbot-dns-inwx-2.1.1.tar.gz (7.2 kB) Copy SHA256 hash SHA256||Source||None|