Research
Security News
Quasar RAT Disguised as an npm Package for Detecting Vulnerabilities in Ethereum Smart Contracts
Socket researchers uncover a malicious npm package posing as a tool for detecting vulnerabilities in Etherium smart contracts.
acme-client
Advanced tools
The acme-client npm package is a client library for the ACME (Automated Certificate Management Environment) protocol, which is used to automate the process of obtaining and renewing SSL/TLS certificates. It is commonly used with Let's Encrypt, a free, automated, and open Certificate Authority.
Creating an ACME client instance
This code demonstrates how to create an instance of the ACME client. The client is configured to use Let's Encrypt's production directory and a newly generated account key.
const acme = require('acme-client');
const client = new acme.Client({
directoryUrl: acme.directory.letsencrypt.production,
accountKey: await acme.forge.createPrivateKey()
});
Creating a new account
This code shows how to create a new account with the ACME server. It agrees to the terms of service and provides a contact email.
await client.createAccount({
termsOfServiceAgreed: true,
contact: ['mailto:admin@example.com']
});
Generating a certificate
This code demonstrates how to generate a certificate signing request (CSR) and then use the ACME client to automatically obtain a certificate for the domain 'example.com'.
const [key, csr] = await acme.forge.createCsr({
commonName: 'example.com'
});
const cert = await client.auto({
csr,
email: 'admin@example.com',
termsOfServiceAgreed: true
});
Renewing a certificate
This code shows how to renew an existing certificate using the ACME client. It requires the existing certificate and CSR.
const renewedCert = await client.renewCertificate({
certificate: existingCert,
csr: existingCsr
});
Greenlock is another ACME client for Node.js that simplifies the process of obtaining and renewing SSL/TLS certificates from Let's Encrypt. It provides a higher-level API compared to acme-client and includes additional features like automatic renewal and integration with various web servers.
The letsencrypt package is a Node.js client for Let's Encrypt. It is designed to be simple and easy to use, providing basic functionality for obtaining and renewing certificates. It is less feature-rich compared to acme-client but can be a good choice for straightforward use cases.
Certbot is a popular ACME client developed by the Electronic Frontier Foundation (EFF). While it is not a Node.js package, it is widely used for obtaining and renewing Let's Encrypt certificates. It offers a comprehensive set of features and is highly configurable, making it suitable for a variety of environments.
A simple and unopinionated ACME client.
This module is written to handle communication with a Boulder/Let's Encrypt-style ACME API.
acme-client | API | Style | Node.js |
---|---|---|---|
v4.x | ACMEv2 | Promise | >= v10 |
v3.x | ACMEv2 | Promise | >= v8 |
v2.x | ACMEv2 | Promise | >= v4 |
v1.x | ACMEv1 | callback | >= v4 |
$ npm install acme-client
const acme = require('acme-client');
const accountPrivateKey = '<PEM encoded private key>';
const client = new acme.Client({
directoryUrl: acme.directory.letsencrypt.staging,
accountKey: accountPrivateKey
});
acme.directory.buypass.staging;
acme.directory.buypass.production;
acme.directory.letsencrypt.staging;
acme.directory.letsencrypt.production;
acme.directory.zerossl.production;
To enable external account binding when creating your ACME account, provide your KID and HMAC key to the client constructor.
const client = new acme.Client({
directoryUrl: 'https://acme-provider.example.com/directory-url',
accountKey: accountPrivateKey,
externalAccountBinding: {
kid: 'YOUR-EAB-KID',
hmacKey: 'YOUR-EAB-HMAC-KEY'
}
});
During the ACME account creation process, the server will check the supplied account key and either create a new account if the key is unused, or return the existing ACME account bound to that key.
In some cases, for example with some EAB providers, this account creation step may be prohibited and might require you to manually specify the account URL beforehand. This can be done through accountUrl
in the client constructor.
const client = new acme.Client({
directoryUrl: acme.directory.letsencrypt.staging,
accountKey: accountPrivateKey,
accountUrl: 'https://acme-v02.api.letsencrypt.org/acme/acct/12345678'
});
You can fetch the clients current account URL, either after creating an account or supplying it through the constructor, using getAccountUrl()
:
const myAccountUrl = client.getAccountUrl();
For key pair generation and Certificate Signing Requests, acme-client
uses node-forge, a pure JavaScript implementation of the TLS protocol.
These utility methods are exposed through .forge
.
API documentation: docs/forge.md
const privateKey = await acme.forge.createPrivateKey();
const [certificateKey, certificateCsr] = await acme.forge.createCsr({
commonName: '*.example.com',
altNames: ['example.com']
});
For convenience an auto()
method is included in the client that takes a single config object. This method will handle the entire process of getting a certificate for one or multiple domains.
A full example can be found at examples/auto.js.
Documentation: docs/client.md#AcmeClient+auto
const autoOpts = {
csr: '<PEM encoded CSR>',
email: 'test@example.com',
termsOfServiceAgreed: true,
challengeCreateFn: async (authz, challenge, keyAuthorization) => {},
challengeRemoveFn: async (authz, challenge, keyAuthorization) => {}
};
const certificate = await client.auto(autoOpts);
When ordering a certificate using auto mode, acme-client
uses a priority list when selecting challenges to respond to. Its default value is ['http-01', 'dns-01']
which translates to "use http-01
if any challenges exist, otherwise fall back to dns-01
".
While most challenges can be validated using the method of your choosing, please note that wildcard certificates can only be validated through dns-01
. More information regarding Let's Encrypt challenge types can be found here.
To modify challenge priority, provide a list of challenge types in challengePriority
:
await client.auto({
...,
challengePriority: ['http-01', 'dns-01']
});
When using auto mode, acme-client
will first validate that challenges are satisfied internally before completing the challenge at the ACME provider. In some cases (firewalls, etc) this internal challenge verification might not be possible to complete.
If internal challenge validation needs to travel through an HTTP proxy, see HTTP client defaults.
To completely disable acme-client
s internal challenge verification, enable skipChallengeVerification
:
await client.auto({
...,
skipChallengeVerification: true
});
For more fine-grained control you can interact with the ACME API using the methods documented below.
A full example can be found at examples/api.js.
API documentation: docs/client.md
const account = await client.createAccount({
termsOfServiceAgreed: true,
contact: ['mailto:test@example.com']
});
const order = await client.createOrder({
identifiers: [
{ type: 'dns', value: 'example.com' },
{ type: 'dns', value: '*.example.com' }
]
});
This module uses axios when communicating with the ACME HTTP API, and exposes the client instance through .axios
.
For example, should you need to change the default axios configuration to route requests through an HTTP proxy, this can be achieved as follows:
const acme = require('acme-client');
acme.axios.defaults.proxy = {
host: '127.0.0.1',
port: 9000
};
A complete list of axios options and documentation can be found at:
To get a better grasp of what acme-client
is doing behind the scenes, you can either pass it a logger function, or enable debugging through an environment variable.
Setting a logger function may for example be useful for passing messages on to another logging system, or just dumping them to the console.
acme.setLogger((message) => {
console.log(message);
});
Debugging to the console can also be enabled through debug by setting an environment variable.
DEBUG=acme-client node index.js
v4.2.5 (2022-03-21)
fixed
Upgrade axios@0.26.1
fixed
Upgrade node-forge@1.3.0
- CVE-2022-24771, CVE-2022-24772, CVE-2022-24773FAQs
Simple and unopinionated ACME client
The npm package acme-client receives a total of 35,593 weekly downloads. As such, acme-client popularity was classified as popular.
We found that acme-client demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
Socket researchers uncover a malicious npm package posing as a tool for detecting vulnerabilities in Etherium smart contracts.
Security News
Research
A supply chain attack on Rspack's npm packages injected cryptomining malware, potentially impacting thousands of developers.
Research
Security News
Socket researchers discovered a malware campaign on npm delivering the Skuld infostealer via typosquatted packages, exposing sensitive data.