Public | Automated Build

Last pushed: a year ago
Short Description
A script to issue and renew TLS certs from Let's Encrypt with DNS challenge
Full Description


Acmedns is a script to issue and renew TLS certs from Let's Encrypt with DNS challenge.

How to use this script

You have 3 posibility to use this script.

  • use acmedns as a library with Client class in your python program.
  • use with acmedns.conf file.
  • use acmedns docker image from docker hub.

Acmedns quick start


In all certificates signing process the issuer should only sign a certificate if you are the owner. In acmedns we
only deliver dns challenge solution. For other challenge you can use other acme client solution the do the job.
Out of the box we have two adapter the manual adapter to validate and as an example how to implement and adapter. And the
second is an adapter for OVH API. If you implement other adapter you can end it as a pull request.

Acmedns configuration

Let's Encrypt configuration

If you already have a Let's Encrypt issued certificate and just want to renew,
you should only have to do Steps 3 and 6.

Step 1: Create a Let's Encrypt account private key (if you haven't already)

You must have a public key registered with Let's Encrypt and sign your requests
with the corresponding private key. If you don't understand what I just said,
this script likely isn't for you! Please use the official Let's Encrypt
To accomplish this you need to initially create a key, that can be used by
acme-tiny, to register a account for you and sign all following requests.

openssl genrsa 4096 > account.key

Use existing Let's Encrypt key

Alternatively you can convert your key, previously generated by the original
Let's Encrypt client.

The private account key from the Let's Encrypt client is saved in the
JWK format. acme-tiny is using the PEM
key format. To convert the key, you can use the tool
conversion script by JonLundy:

# Download the script
wget -O - "" >

# Copy your private key to your working directory
cp /etc/letsencrypt/accounts/<id>/private_key.json private_key.json

# Create a DER encoded private key
openssl asn1parse -noout -out private_key.der -genconf <(python private_key.json)

# Convert to PEM
openssl rsa -in private_key.der -inform der > account.key

Step 2: Create a certificate signing request (CSR) for your domains.

The ACME protocol (what Let's Encrypt uses) requires a CSR file to be submitted
to it, even for renewals. You can use the same CSR for multiple renewals. NOTE:
you can't use your account private key as your domain private key!

#generate a domain private key (if you haven't already)
openssl genrsa 4096 > domain.key
#for a single domain
openssl req -new -sha256 -key domain.key -subj "/" > domain.csr

#for multiple domains (use this one if you want both and
openssl req -new -sha256 -key domain.key -subj "/" -reqexts SAN -config <(cat /etc/ssl/openssl.cnf <(printf "[SAN]\,")) > domain.csr

check your certificat

openssl req -in domain.csr -noout -text

Step 3: Make your website host challenge files

You must prove you own the domains you want a certificate for, so Let's Encrypt
requires you host some files on them. This script will generate and write those
files in the folder you specify, so all you need to do is make sure that this
folder is served under the ".well-known/acme-challenge/" url path. NOTE: Let's
Encrypt will perform a plain HTTP request to port 80 on your server, so you
must serve the challenge files via HTTP (a redirect to HTTPS is fine too).

#make some challenge folder (modify to suit your needs)
mkdir -p /var/www/challenges/
#example for nginx
server {
    listen 80;

    location /.well-known/acme-challenge/ {
        alias /var/www/challenges/;
        try_files $uri =404;

    ...the rest of your config

Step 4: Get a signed certificate!

Now that you have setup your server and generated all the needed files, run this
script on your server with the permissions needed to write to the above folder
and read your private account key and CSR.

#run the script on your server
python --account-key ./account.key --csr ./domain.csr --acme-dir /var/www/challenges/ > ./signed.crt

Step 5: Install the certificate

The signed https certificate that is output by this script can be used along
with your private key to run an https server. You need to include them in the
https settings in your web server's configuration. Here's an example on how to
configure an nginx server:

#NOTE: For nginx, you need to append the Let's Encrypt intermediate cert to your cert
wget -O - > intermediate.pem
cat signed.crt intermediate.pem > chained.pem
server {
    listen 443;

    ssl on;
    ssl_certificate /path/to/chained.pem;
    ssl_certificate_key /path/to/domain.key;
    ssl_session_timeout 5m;
    ssl_protocols TLSv1 TLSv1.1 TLSv1.2;
    ssl_session_cache shared:SSL:50m;
    ssl_dhparam /path/to/server.dhparam;
    ssl_prefer_server_ciphers on;

    ...the rest of your config

server {
    listen 80;

    location /.well-known/acme-challenge/ {
        alias /var/www/challenges/;
        try_files $uri =404;

    ...the rest of your config

Step 6: Setup an auto-renew cronjob

Congrats! Your website is now using https! Unfortunately, Let's Encrypt
certificates only last for 90 days, so you need to renew them often. No worries!
It's automated! Just make a bash script and add it to your crontab (see below
for example script).

Example of a

python /path/to/ --account-key /path/to/account.key --csr /path/to/domain.csr --acme-dir /var/www/challenges/ > /tmp/signed.crt || exit
wget -O - > intermediate.pem
cat /tmp/signed.crt intermediate.pem > /path/to/chained.pem
service nginx reload
#example line in your crontab (runs once per month)
0 0 1 * * /path/to/ 2>> /var/log/acme_tiny.log


The biggest problem you'll likely come across while setting up and running this
script is permissions. You want to limit access to your account private key and
challenge web folder as much as possible. I'd recommend creating a user
specifically for handling this script, the account private key, and the
challenge folder. Then add the ability for that user to write to your installed
certificate file (e.g. /path/to/chained.pem) and reload your webserver. That
way, the cron script will do its thing, overwrite your old certificate, and
reload your webserver without having permission to do anything else.


  • Backup your account private key (e.g. account.key)
  • Don't allow this script to be able to read your domain private key!
  • Don't allow this script to be run as root!


This project has a very, very limited scope and codebase. I'm happy to receive
bug reports and pull requests, but please don't add any new features. This
script must stay under 200 lines of code to ensure it can be easily audited by
anyone who wants to run it.

If you want to add features for your own setup to make things easier for you,
please do! It's open source, so feel free to fork it and modify as necessary.

I bootstrap this program with the acme-tiny script.

Docker Pull Command
Source Repository