golang.org/x/crypto/acme/autocert
#65727 opened 9 months ago by bradfitz
#64997 opened 10 months ago by mjl-
ToS prompt check for ToS-less ACME serversNeedsInvestigation
#64881 opened 10 months ago by benburkert
#63124 opened 1 year ago by mjl-
better error messages for failed validationsNeedsInvestigation
#60554 opened 1 year ago by mjl-
NewOrder request did not include a SAN short enough to fit in CNNeedsInvestigation
#53194 opened 2 years ago by anacrolix
renewal test failures due to connection errors on windows/arm64NeedsInvestigationOS-Windowsarch-arm64
#51080 opened 2 years ago by bcmills
#51064 opened 2 years ago by mcrute
support ECDSA on TLS1.3-only connectionsNeedsInvestigation
#50522 opened 2 years ago by mjl-
#48747 opened 3 years ago by hochhaus
#46439 opened 3 years ago by jsha
#39638 opened 4 years ago by h8liu
Error http: TLS handshake error from <ip>:<port>: Head "": unsupported protocol scheme "" trying to connect to letsencrypt's pebbleNeedsInvestigation
#39284 opened 4 years ago by tofsme
Consider storing certificates as "*.pem" in DirCacheNeedsInvestigation
#37354 opened 4 years ago by arp242
#36818 opened 4 years ago by rgooch
Manager.RenewBefore must be >1hourNeedsInvestigation
#36548 opened 4 years ago by leitzler
verify the beginning time of an issued cert is not necessaryNeedsInvestigation
#28201 opened 6 years ago by snowie2000
#28158 opened 6 years ago by anurag
#23198 opened 7 years ago by winteraz
Hooks for "CertAcquired", "CertRenewed"NeedsInvestigation
#21224 opened 7 years ago by prologic
#20640 opened 7 years ago by bradfitz
assume default domain for non-SNI connections?NeedsInvestigation
#18785 opened 7 years ago by rsc
#18433 opened 8 years ago by taralx
lock usage around certState is bogus and error proneNeedsInvestigation
#17749 opened 8 years ago by niemeyer