Project ideas from Hacker News discussions.

DNS-Persist-01: A New Model for DNS-Based Challenge Validation

📝 Discussion Summary (Click to expand)

Four key themes that dominate the discussion

# Theme Representative quotes
1 Operational convenience vs. the cost of a persistent DNS record “I really like and hate this at the same time.” – mmh0000
“This is a great step forward. But I agree with others that there is absolutely no reason to expose account numbers; it should be a random ID.” – csense
“This will make it so much easier.” – qwertox
2 Privacy and exposure of the ACME account URI “This is publicly publishing the account ID… it’s easy to scrape and will be (this is exactly the kind of opsec info project like Maltego love to go lookup and pull in).” – TrueDuality
“The account URI is opaque… the privacy exposure is modest: it reveals which CA account controls the domain.” – pepdar
3 Security posture – DNSSEC, MPIC, and attack surface “DNSSEC prevents any modification of records, but isn’t widely deployed.” – mcpherrinm
“We query authoritative nameservers directly from at least four places… this (called MPIC) makes interception more difficult.” – msmith
“If a CA performs DNSSEC validation and it fails… the CA MUST treat it as a challenge failure.” – pepdar
4 Implementation & tooling choices (Docker, APIs, per‑domain accounts, key rotation) “Run ACME inside a Docker container, one instance (and credentials) for each domain name.” – mschuster91
“Use a UUID as username… create one LetsEncrypt account per FQDN.” – ragall
“Key rotation doesn’t change the account URI – ACME key rollover replaces the key pair but keeps the same account URL.” – pepdar

These four themes capture the bulk of the conversation: the promise of easier automation, the trade‑off of exposing account identifiers, the security mechanisms that mitigate the new attack surface, and the practical choices developers make to adopt the new DNS‑PERSIST‑01 method.


🚀 Project Ideas

ACME Account CLI Tool (acmecli)

Summary

  • A command‑line utility that creates, rekeys, and deactivates ACME accounts, and outputs the exact DNS‑PERSIST‑01 record string for any domain.
  • Provides a single, repeatable workflow for generating the persistent record, eliminating manual scripting and reducing the risk of mis‑configuration.

Details

Key Value
Target Audience DevOps engineers, sysadmins, and automation engineers who use Let’s Encrypt or other ACME CAs.
Core Feature ACME account lifecycle management + DNS‑PERSIST‑01 record generation.
Tech Stack Go (for speed and static binaries), ACME client libraries, optional DNS provider SDKs.
Difficulty Medium
Monetization Hobby

Notes

  • “TrueDuality: I think this is solving a real operational pain point” – the tool directly addresses that pain by automating account creation.
  • “mcpherrinm: The account URI survives key rotation” – the CLI can rotate keys without changing the DNS record, matching this requirement.
  • Practical utility: can be integrated into CI/CD pipelines or containerized in Docker for repeatable deployments.

DNS‑Persist‑01 Hosted Service (dns‑persist.io)

Summary

  • A web‑based service that manages ACME accounts and automatically publishes the required DNS‑PERSIST‑01 TXT record to any supported DNS provider.
  • Eliminates the need for local scripts or manual DNS updates, and provides a dashboard for key rotation and account isolation.

Details

Key Value
Target Audience Small to medium businesses, hosting providers, and individual site owners.
Core Feature Centralized ACME account management + automated DNS‑PERSIST‑01 record deployment via provider APIs.
Tech Stack Node.js/Express, PostgreSQL, provider SDKs (Cloudflare, Hetzner, etc.), Docker for deployment.
Difficulty High
Monetization Revenue‑ready: tiered subscription ($5/month for 10 domains, $20/month for 100 domains).

Notes

  • “mschuster91: Run ACME inside a Docker container, one instance (and credentials) for each domain name” – the service abstracts that complexity.
  • “basilikum: DNS‑Persist‑01 is not something I think I will ever need but clearly someone does” – the service targets exactly that niche.
  • Discussion potential: pricing models for multi‑tenant DNS management and key rotation policies.

Multi‑Provider ACME Automation Platform (acme‑ops)

Summary

  • A platform that abstracts all major DNS provider APIs, supports dynamic DNS updates, and automates certificate issuance using dns‑persist‑01.
  • Includes per‑domain ACME accounts, key rotation, and integration with CI/CD pipelines.

Details

Key Value
Target Audience DevOps teams, SaaS providers, and infrastructure as code practitioners.
Core Feature Unified DNS provider abstraction + automated ACME account creation, key rotation, and certificate renewal.
Tech Stack Python (FastAPI), Terraform modules, Kubernetes operators, provider SDKs.
Difficulty High
Monetization Revenue‑ready: pay‑per‑domain ($0.02/domain/month) plus optional managed service add‑on.

Notes

  • “mschuster91: Run ACME inside a Docker container, one instance (and credentials) for each domain name” – the platform automates that container orchestration.
  • “mcpherrinm: The account URI survives key rotation” – the platform handles key rotation without DNS changes.
  • Practical utility: reduces manual scripting across multiple providers, enabling consistent automation.

DNSSEC Validation Checker for ACME (dnssec‑checker)

Summary

  • A lightweight tool that verifies DNSSEC signatures for dns‑persist‑01 TXT records, ensuring the record’s integrity before ACME validation.
  • Helps mitigate MITM and DNS tampering concerns raised by commenters.

Details

Key Value
Target Audience Security engineers, auditors, and CA operators.
Core Feature DNSSEC validation of dns‑persist‑01 records, reporting on signature chain, TTL, and potential tampering.
Tech Stack Rust (for performance), trust-dns, OpenSSL.
Difficulty Medium
Monetization Hobby

Notes

  • “IgorPartola: I suppose the only way to block me from getting a TLS certificate if I can modify your DNS” – this tool directly addresses that fear.
  • “rmoriz: I would have loved to see mandatory DNSSEC requirements” – the checker can be used as a compliance audit tool.
  • Discussion potential: whether to enforce DNSSEC for ACME and how to integrate with existing CA workflows.

Read Later