Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

Automatic Certificate Management Environment

From Wikipedia, the free encyclopedia
Protocol to manage public key certificates
ACME logo

TheAutomatic Certificate Management Environment (ACME) protocol is acommunications protocol for automating interactions betweencertificate authorities and their users' servers, allowing the automated deployment ofpublic key infrastructure at very low cost.[1][2] It was designed by theInternet Security Research Group (ISRG) for theirLet's Encrypt service.[1]

The protocol, based on passingJSON-formatted messages overHTTPS,[2][3] has been published as an Internet Standard inRFC 8555[4] by its own charteredIETF working group.[5]

Client implementations

[edit]

The ISRG providesfree and open-source reference implementations for ACME:certbot is aPython-based implementation of server certificate management software using the ACME protocol,[6][7][8] andboulder is acertificate authority implementation, written inGo.[9]

Since 2015 a large variety of client options have appeared for all operating systems.[10]

Web servers likeCaddy,Traefik Proxy,[11]Nginx (starting in August, 2025), andApache HTTP Server[12] (2.4.30 and later) have built in support for automatically acquiring a TLS certificate using the ACME protocol.[13][14]

API versions

[edit]

API version 1

[edit]

API v1 specification was published on April 12, 2016. It supports issuing certificates for fully-qualified domain names, such asexample.com orcluster.example.com, but not wildcards like*.example.com. Let's Encrypt turned off API v1 support on 1 June 2021.[15]

API version 2

[edit]

API v2 was released March 13, 2018 after being pushed back several times. ACME v2 is not backwards compatible with v1. Version 2 supports wildcard domains, such as*.example.com, allowing for many subdomains to have trustedTLS, e.g.https://cluster01.example.com,https://cluster02.example.com,https://example.com, on private networks under a single domain using a single shared "wildcard" certificate.[16] A major new requirement in v2 is that requests for wildcard certificates require the modification of a Domain Name ServiceTXT record, verifying control over the domain.

Changes to ACME v2 protocol since v1 include:[17]

  • The authorization/issuance flow has changed
  • JWS request authorization has changed
  • The "resource" field of JWS request bodies is replaced by a new JWS header: "url"
  • Directory endpoint/resource renaming
  • URI → URL renaming in challenge resources
  • Account creation and ToS agreement are combined into one step. Previously, these were two steps.
  • A new challenge type was implemented, TLS-ALPN-01. Two earlier challenge types, TLS-SNI-01 and TLS-SNI-02, were removed because of security issues.[18][19]

See also

[edit]

References

[edit]
  1. ^abSteven J. Vaughan-Nichols (9 April 2015)."Securing the web once and for all: The Let's Encrypt Project".ZDNet.
  2. ^absh."ietf-wg-acme/acme-spec".GitHub. Retrieved2017-04-05.
  3. ^Chris Brook (18 November 2014)."EFF, Others Plan to Make Encrypting the Web Easier in 2015". ThreatPost.
  4. ^Barnes, R.; Hoffman-Andrews, J.; McCarney, D.; Kasten, J. (2019-03-12).Automatic Certificate Management Environment (ACME).IETF.doi:10.17487/RFC8555.RFC8555. Retrieved2019-03-13.
  5. ^"Automated Certificate Management Environment (acme)".IETF Datatracker. Retrieved2019-03-12.
  6. ^"Certbot".EFF. Retrieved2016-08-14.
  7. ^"certbot/certbot".GitHub. Retrieved2016-06-02.
  8. ^"Announcing Certbot: EFF's Client for Let's Encrypt".LWN. 2016-05-13. Retrieved2016-06-02.
  9. ^"letsencrypt/boulder".GitHub. Retrieved2015-06-22.
  10. ^"ACME Client Implementations - Let's Encrypt - Free SSL/TLS Certificates".letsencrypt.org. 20 February 2025.
  11. ^Warren, Brad (7 March 2024)."Should Caddy and Traefik Replace Certbot?".Electronic Frontier Foundation. Retrieved16 September 2025.
  12. ^"mod_md - Apache HTTP Server Version 2.4".httpd.apache.org. Archived fromthe original on 2025-09-25. Retrieved2025-10-07.
  13. ^"NGINX Introduces Native Support for ACME Protocol – NGINX Community Blog". 12 August 2025. Retrieved14 September 2025.
  14. ^"Native ACME Support Comes to NGINX".Let's Encrypt. 11 September 2025. Retrieved14 September 2025.
  15. ^"End of Life Plan for ACMEv1 - API Announcements".Let's Encrypt Community Support. 2021-05-05. Retrieved2021-06-12.
  16. ^"ACME v2 API Endpoint Coming January 2018 - Let's Encrypt - Free SSL/TLS Certificates".letsencrypt.org. 14 June 2017.
  17. ^"Staging endpoint for ACME v2".Let's Encrypt Community Support. January 5, 2018.
  18. ^"Challenge Types - Let's Encrypt Documentation".Let's Encrypt. 2020-12-08. Retrieved2021-05-12.
  19. ^Barnes, R.; Hoffman-Andrews, J.; McCarney, D.; Kasten, J. (2019-03-12).Automatic Certificate Management Environment (ACME).IETF.doi:10.17487/RFC8555.RFC8555. Retrieved2021-05-12.The values "tls-sni-01" and "tls-sni-02" are reserved because they were used in pre-RFC versions of this specification to denote validation methods that were removed because they were found not to be secure in some cases.

External links

[edit]
Protocols and technologies
Public-key infrastructure
See also
History
Implementations
Notaries
Vulnerabilities
Theory
Cipher
Protocol
Implementation
Retrieved from "https://en.wikipedia.org/w/index.php?title=Automatic_Certificate_Management_Environment&oldid=1338192053"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2026 Movatter.jp