mirror of
https://github.com/mjl-/mox.git
synced 2025-07-12 12:24:38 +03:00
when suggesting CAA records for a domain, suggest variants that bind to the account id and with validation methods used by mox
should prevent potential mitm attacks. especially when done close to the machine itself (where a http/tls challenge is intercepted to get a valid certificate), as seen on the internet last month.
This commit is contained in:
@ -612,6 +612,12 @@ func PrepareStaticConfig(ctx context.Context, log mlog.Log, configFile string, c
|
||||
addErrorf("loading ACME identity for %q: %s", name, err)
|
||||
}
|
||||
acme.Manager = manager
|
||||
|
||||
// Help configurations from older quickstarts.
|
||||
if acme.IssuerDomainName == "" && acme.DirectoryURL == "https://acme-v02.api.letsencrypt.org/directory" {
|
||||
acme.IssuerDomainName = "letsencrypt.org"
|
||||
}
|
||||
|
||||
c.ACME[name] = acme
|
||||
}
|
||||
|
||||
|
Reference in New Issue
Block a user