TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Show HN: Anchor – developer-friendly private CAs for internal TLS

76 pointsby benburkertover 1 year ago
Hi HN! I&#x27;m Ben, co-founder of Anchor (<a href="https:&#x2F;&#x2F;anchor.dev&#x2F;" rel="nofollow noreferrer">https:&#x2F;&#x2F;anchor.dev&#x2F;</a>). Anchor is a hosted service for ACME powered internal X.509 CAs. We recently launched our features &amp; tooling for local development. The goal is to make it easy and toil-free to develop locally with HTTPS, and also provide dev&#x2F;prod parity for TLS&#x2F;HTTPS encryption.<p>You can add Anchor to your development workflow in minutes. Here&#x27;s how:<p>- <a href="https:&#x2F;&#x2F;blog.anchor.dev&#x2F;getting-started-with-anchor-for-local-development-6dd2cd605c08" rel="nofollow noreferrer">https:&#x2F;&#x2F;blog.anchor.dev&#x2F;getting-started-with-anchor-for-loca...</a><p>- <a href="https:&#x2F;&#x2F;blog.anchor.dev&#x2F;service-to-service-tls-in-development-d0df479d67ce" rel="nofollow noreferrer">https:&#x2F;&#x2F;blog.anchor.dev&#x2F;service-to-service-tls-in-developmen...</a><p>We started Anchor because private CAs were a constant source of frustration throughout our careers. Avoiding them makes it all the more painful when you&#x27;re finally forced to use one. The release of ACME and Let&#x27;s Encrypt was a big step forward in certificate provisioning, but the improvements have been almost entirely in the WebPKI and public CA space. Internal TLS is still as unpleasant &amp; painful to use as it has been for the past 20 years. So we&#x27;ve built Anchor to be a developer-friendly way to setup internal TLS that fully leverages the benefits of ACME:<p>- no encryption experience or X.509 knowledge required<p>- automatically generated system and language packages to manage client trust stores<p>- ACME (RFC 8555) compliant API, broad language&#x2F;tooling support for cert provisioning<p>- fully hosted, no services or infra requirements<p>- works the same in all deployment environments, including development<p>If you&#x27;re interested in more specific details and strategy, our blog posts cover all this and more: <a href="https:&#x2F;&#x2F;blog.anchor.dev&#x2F;" rel="nofollow noreferrer">https:&#x2F;&#x2F;blog.anchor.dev&#x2F;</a><p>We are asking for feedback on our features for local development, and would like to hear your thoughts &amp; questions. Many thanks!

8 comments

westurnerover 1 year ago
What advantages over say, smallstep&#x2F;certificates, letsencrypt&#x2F;boulder, django-ca, square&#x2F;certstrap, or hashicorp&#x2F;vault (and e.g. OpenWRT&#x27;s luci-app-acme ACMEv2 GUI) does Anchor offer?<p><a href="https:&#x2F;&#x2F;github.com&#x2F;topics&#x2F;acme">https:&#x2F;&#x2F;github.com&#x2F;topics&#x2F;acme</a><p>applications&#x2F;luci-app-acme&#x2F;htdocs&#x2F;luci-static&#x2F;resources&#x2F;view&#x2F;acme.js: <a href="https:&#x2F;&#x2F;github.com&#x2F;openwrt&#x2F;luci&#x2F;blob&#x2F;master&#x2F;applications&#x2F;luci-app-acme&#x2F;htdocs&#x2F;luci-static&#x2F;resources&#x2F;view&#x2F;acme.js">https:&#x2F;&#x2F;github.com&#x2F;openwrt&#x2F;luci&#x2F;blob&#x2F;master&#x2F;applications&#x2F;luc...</a><p><a href="https:&#x2F;&#x2F;openwrt.org&#x2F;docs&#x2F;guide-user&#x2F;services&#x2F;tls&#x2F;acmesh" rel="nofollow noreferrer">https:&#x2F;&#x2F;openwrt.org&#x2F;docs&#x2F;guide-user&#x2F;services&#x2F;tls&#x2F;acmesh</a><p><a href="https:&#x2F;&#x2F;developer.hashicorp.com&#x2F;vault&#x2F;tutorials&#x2F;secrets-management&#x2F;pki-engine" rel="nofollow noreferrer">https:&#x2F;&#x2F;developer.hashicorp.com&#x2F;vault&#x2F;tutorials&#x2F;secrets-mana...</a> <a href="https:&#x2F;&#x2F;github.com&#x2F;hashicorp&#x2F;vault">https:&#x2F;&#x2F;github.com&#x2F;hashicorp&#x2F;vault</a> :<p>&gt; <i>Refer to Build Certificate Authority (CA) in Vault with an offline Root for an example of using a root CA external to Vault.</i>
评论 #38100444 未加载
candiddevmikeover 1 year ago
I&#x27;m not sure I understand the value prop. For localhost, you typically just generate a self-signed certificate that doesn&#x27;t need to be trusted by everyone, as the dev can just add it to their local store. There are also other services that provide ACME certificates for localhost domains, basically what you do for free (I can&#x27;t find a link to one but it was posted on HN recently).<p>If you need a trusted certificate for local dev, something like Cloudflare Tunnels is more valuable as you can have other folks access the service.
评论 #38100637 未加载
评论 #38099055 未加载
评论 #38099062 未加载
评论 #38100334 未加载
评论 #38098887 未加载
moqmarover 1 year ago
I don&#x27;t really understand how &quot;hosted&quot; and &quot;internal&quot; go together here - does this mean that a) the devices I need certificates for must connect to your servers, and that b) your servers could theoretically sign certificates for devices which do not exist? If so, especially for the latter point, this IMO isn&#x27;t really useful for any real-world application, as the most important things of a CA is control.
评论 #38100023 未加载
samcat116over 1 year ago
Does this help at all with the issue of deploying the root CA cert on every device that will interact with services with these certs deployed? That seems to me to be the hardest part about running an internal CA. You&#x27;ve got to put it on everyones laptops as well as all your servers.
评论 #38099351 未加载
tomjen3over 1 year ago
How is this better than using the internal tls setting for caddy?
评论 #38099204 未加载
sneakover 1 year ago
Feedback:<p>I don’t use services that require external services to auth with. I’ve stopped using GitHub whenever&#x2F;wherever possible because of the ICE concentration camps thing and your service doesn’t allow me to log in or create an account without using GitHub.<p>Your website doesn’t say how much it costs.
2023throwawayyover 1 year ago
Pricing is missing.
评论 #38101214 未加载
评论 #38101105 未加载
Wool2662over 1 year ago
Your footer &#x27;Get Started&#x27; link is broken.
评论 #38098850 未加载