Thanks for making Let's Encrypt and ACME!
location /.well-known/acme-challenge/ {
alias /var/www/acme-webroot/.well-known/acme-challenge/;
}
Then use this this tool from mozilla to get a configuration for installing the cert: https://mozilla.github.io/server-side-tls/ssl-config-generat...https://en.wikipedia.org/wiki/DNS-based_Authentication_of_Na...
Until the CA system is completely abolished, this appears to works great with LE -- free certificates and a guarantee that no other CA can impersonate you.
The ACME protocol could conceivably be extended to update SRV records along with the certificate for some DNS providers.
1. DNSSEC uses a lot of 1024-bit RSA signatures (those are relatively weak) 2. You can't monitor the certificates that CA's issue because anyone issue their own certificates.
The first issue seems valid, but fixable. The second is a weird thing to complain about because it is the entire point of DANE!
[0]: https://community.letsencrypt.org/t/beta-program-announcemen...
[1]: https://letsencrypt.status.io/pages/maintenance/55957a99e800...
EDIT: IdenTrust, not Entrust, sorry!