|
NAMEdehydrated - ACME client implemented as a shell-scriptSYNOPSISdehydrated [command [argument]] [argument [argument]] ...DESCRIPTIONA client for ACME-based Certificate Authorities, such as LetsEncrypt. It can be used to request and obtain TLS certificates from an ACME-based certificate authority.Before any certificates can be requested, Dehydrated needs to acquire an account with the Certificate Authorities. Optionally, an email address can be provided. It will be used to e.g. notify about expiring certificates. You will usually need to accept the Terms of Service of the CA. Dehydrated will notify if no account is configured. Run with --register --accept-terms to create a new account. Next, all domain names must be provided in domains.txt. The format is line based: If the file contains two lines "example.com" and "example.net", Dehydrated will request two certificate, one for "example.com" and the other for "example.net". A single line while "example.com example.net" will request a single certificate valid for both "example.net" and "example.com" through the Subject Alternative Name (SAN) field. For the next step, one way of verifying domain name ownership needs to be configured. Dehydrated implements http-01 and dns-01 verification. The http-01 verification provides proof of ownership by providing a challenge token. In order to do that, the directory referenced in the WELLKNOWN config variable needs to be exposed at http://{domain}/.well-known/acme-challenge/, where {domain} is every domain name specified in domains.txt. Dehydrated does not provide its own challenge responder, but relies on an existing web server to provide the challenge response. See wellknown.md for configuration examples of popular web servers. The dns-01 verification works by providing a challenge token through DNS. This is especially interesting for hosts that cannot be exposed to the public Internet. Because adding records to DNS zones is oftentimes highly specific to the software or the DNS provider at hand, there are many third party hooks available for dehydrated. See dns-verification.md for hooks for popular DNS servers and DNS hosters. Finally, the certificates need to be requested and updated on a regular basis. This can happen through a cron job or a timer. Initially, you may enforce this by invoking dehydrated -c manually. After a successful run, certificates are stored in /etc/dehydrated/certs/{domain}, where {domain} is the domain name in the first column of domains.txt. OPTIONSCommands
Parameters
DIAGNOSTICSThe program exits 0 if everything was fine, 1 if an error occurred.BUGSPlease report any bugs that you may encounter at the project web site https://github.com/lukas2511/dehydrated/issues.AUTHORDehydrated was written by Lukas Schauer. This man page was contributed by Daniel Molkentin.COPYRIGHTCopyright 2015-2018 by Lukas Schauer and the respective contributors. Provided under the MIT License. See the LICENSE file that accompanies the distribution for licensing information.SEE ALSOFull documentation along with configuration examples are provided in the docs directory of the distribution, or at https://github.com/lukas2511/dehydrated/tree/master/docs.
Visit the GSP FreeBSD Man Page Interface. |