zalasur, to random
@zalasur@mastodon.surazal.net avatar

For anyone who uses along with to get wildcard support for their domains, be aware that GoDaddy changed their API so that the DNS challenge no longer works. That means the godaddy certbot plugin can no longer validate your domain via TXT record.

I'll be moving away from GoDaddy anyways so it wasn't really a big deal for me, but the only workaround is to remove the old configuration for Let's Encrypt and manually specify all your domains when getting new certs.

zirias, to windows
@zirias@techhub.social avatar

Goal: Get some certificate obtained with deployed on some box

Step 1: Ok, this probably works best with (which I don't really like ...)

Step 2: There's no port ... but hey, there's now a FreeBSD port of , let's try to "just" build Powershell using that.

Step 3: Hell why does it fail to build. Oh, System.Security.Cryptography.Native doesn't play well with

Patch and retry, I guess I'll take some sleep now first. Bah!

(there's some irony in running into OpenSSL/LibreSSL issues when trying to deploy TLS certificates ...)

vwbusguy, to firefox
@vwbusguy@mastodon.online avatar

Well, this is interesting.

bazcurtis, to homeassistant
@bazcurtis@mastodon.social avatar

I am going to try to setup Let’s Encypt on my Home Assistant server this weekend.

This article looks very helpful.

https://theprivatesmarthome.com/how-to/enable-https-using-lets-encrypt-in-home-assistant/

matthew, to random
@matthew@social.retroedge.tech avatar

Dealing with paid SSL certificates can be confusing. makes it so much easier.

vwbusguy, to Kubernetes
@vwbusguy@mastodon.online avatar
senzilla, to random

The acme-client tool must be the best thing since sliced bread. Seriously.

thomas, to infosec
@thomas@metalhead.club avatar

Are there already elegant solutions for distributing Let's Encrypt certificates to multiple hosts?

Of course, you can have each host request certificates individually, but then you run into ACME API limits at Let's Encrypt relatively quickly, depending on the number of hosts and simultaneous accesses.

I do not want to have to fiddle around.

#letsencrypt #server #selfhosting #infosec #tls #certificates #hosting #acme

genebean, to selfhosted
@genebean@fosstodon.org avatar

I’m pretty stoked to see that there is support for doing a dns challenge to Gandi with the library uses to obtain Let’s Encrypt certificates for use with . This is going to be nice for a server that isn’t directly exposed to the internet.
[ ]

strobelstefan, to random German

Ein Let's Encrypt Zertifikat für die Nextcloud im eigenen Netzwerk

In diesem Beitrag geht es darum eine Nextcloud im eigenen Netzwerk mit einem offiziellen Let's Encrypt Zertifikat auszustatten, die eigentlich NICHT über das Internet erreichbar ist.

https://strobelstefan.de/blog/2023/12/10/ein_eigenes_lets_encrypt_zertifikat_f%C3%BCr_die_nextcloud_im_eigenen_netzwerk/

jschauma, to random
@jschauma@mstdn.social avatar

Let's Encrypt will issue new intermediate certs in Q1/2024: https://groups.google.com/a/mozilla.org/g/dev-security-policy/c/L7XoAXt_s1c

Make sure your LE cert deployment logic includes serving the right intermediates that ACME should hand you, not just that same old LE intermediate you got years ago. Otherwise, there'll be breakage...

rollin_rob, to email

Why isn't there something like but for certificates, so we could stop sending unencrypted mails? The S/MIME standard is built into almost every mail client, the only thing that's missing are the free certificates. Ok, and a smart software for renewal, but first things first.

irfan, (edited ) to Kubernetes

UPDATE: The service is accessible by its domain () as soon as I set the DNS server of my client machine to my PiHole. For other systems not using my local DNS (so outside my network), the domain remains unreachable. My suspicion is an issue with the Port Forwards, but idk what's wrong w em as it is.


Note: this may not be in the exact order. If the order to any of this is important, feel free to point that out.

  1. I've added to , to my zone (domain), the hostname foo pointing to my network's public IP.

  2. I've deployed everything you'd need including (which determines the dedicated Ingress private IP), -ingress (type set to LoadBalancer instead of NodePort), and -manager (with both HTTP/DNS clusterissuers). If you want to take a peek at how I've deployed/configured them, more details are on here: https://github.com/irfanhakim-as/orked.

  3. I've added foo.domain to the closest thing resembling to a DNS server that I have, , pointing to the dedicated Ingress private IP.

  4. I've set my router's only DNS server to the PiHole's IP.

  5. I've set all my Kubernetes nodes' (Masters and Workers) DNS1 to the Router's IP (DNS2 set to Cloudflare's, 1.1.1.1).

  6. I've created a port forwarding rule for HTTP on my router with 1) WAN Start/End ports set to 80, 2) Virtual Host port set to its nodePort (acquired from kubectl get svc -n ingress-nginx ingress-nginx-controller -o=jsonpath='{.spec.ports[0].nodePort}' i.e. 3XXXX), 3) Protocol set to TCP, and 4) LAN Host address set to the dedicated Ingress private IP.

  7. I've created a port forwarding rule for HTTPS on my router with 1) WAN Start/End ports set to 443, 2) Virtual Host port set to its nodePort (acquired from kubectl get svc -n ingress-nginx ingress-nginx-controller -o=jsonpath='{.spec.ports[1].nodePort}' i.e. 3XXXX), 3) Protocol set to TCP, and 4) LAN Host address set to the dedicated Ingress private IP.

  8. I've deployed a container service, and an Ingress for it, using 's DNS validation clusterissuer.

Current result:

  • Cert-manager creates a certificate automatically and is in a Ready: True state as expected.

  • The subdomain (foo.domain) however remains unreachable, no 404 errors, no nothing. Just "The connection has timed out" error.

  • Describing the container service's ingress (foo.domain), shows that it's stuck at "Scheduled for sync".

and experts - please tell me what I've done in any of this that were either wrong or unnecessary, or what I'm currently missing here for me to reach my goal of being able to get my container accessible via foo.domain through that Ingress. I suspect that I might be doing something wrong with this whole DNS mess I literally cannot fathom. I feel like I'm insanely close to getting this thing to work, but I fear I'm also insanely close of blowing up my brain.

cc: @telnetlocalhost (thanks for bearing w me and getting me this far)

greg, to random
@greg@clar.ke avatar

Let's Encrypt is apparently the Certificate Authority competitor Cloudflare trusts the most.

#CloudFlare #LetsEncrypt #SSL #CertificateAuthority

ge0rg, (edited ) to random
@ge0rg@chaos.social avatar

Detailed and credible looking report of on an server hosted at in Germany: https://notes.valdikss.org.ru/jabber.ru-mitm/

Looks like a transparent bridge was deployed in front of the actual server, obtained dedicated certificates from and MitMed all incoming client connections since July. It was discovered because the LE certificate expired 🤦

scy, (edited ) to Germany
@scy@chaos.social avatar

Interesting. Apparently, both 's and 's German datacenters were used to connections to jabber.ru servers hosted there. There's a detailed postmortem here:
https://notes.valdikss.org.ru/jabber.ru-mitm/

I'd take these allegations with a grain of salt. But I must say that MitM'ing with a certificate and then forgetting to renew it, leading to discovery, sounds like the most German law enforcement thing ever.

via https://devco.social/@ripienaar/111268338360338392

stevesplace, to mastodon
@stevesplace@mastodon.social avatar

Apparently nobody uses the source code. How about this? Is there anyone out there who is expert with nginx?

#mastodon #nginx #letsencrypt #certbot #nodejs #wtf

cmsj, to linux

I run all of my homelab services in Docker, with SSL certs from LetsEncrypt. It's awesome, except when the cert renews and none of those services notice.

So, I add a label to those containers of net.tenshu.ssl=true

Then, I have a script in certbot's renewal-hooks/deploy/ which does this:

#!/bin/sh
apk update
apk add docker-cli
docker ps -f "label=net.tenshu.ssl" --format "{{ index .Names }}" | xargs docker restart

and they get restarted after each renewal!



unixtippse, to random German
@unixtippse@mastodon.online avatar

Auf https://secure.seat.es, dem Endpunkt für die Fahrzeug-API-Zugriffe bei und ist seit gestern mittag das - abgelaufen. Diese Kinderzimmer-IT kann sich doch kein Mensch ausdenken. Wir haben hier Kunden, für die betreiben wir Renewal und Monitoring ohne gesonderte Berechnung nebenbei, weil das so extrem wenig Aufwand ist. 🤦‍♂️

kurisuchan, to Cybersecurity

Within five minutes of requesting a new certificate from , a total of 50 different IPs hit my zero-traffic-other-than-me web server.

Thanks to Certificate Transparency it's never been easier to get your honeypot discovered!

PrivacyDigest, to privacy
@PrivacyDigest@mas.to avatar
mattbee, to random
@mattbee@mastodon.org.uk avatar

With , is there a mechanism for moving a site from one server to another where you can't access the private key on the old server? (e.g. from Netlify or other "managed" setup).

hypolite, to sysadmin

This morning my websites weren't loading because the Let's Encrypt certificates expired despite the auto-renewal I set up. It turns out I recently moved my domains from Gandi to Porkbun and certbot wasn't able to renew the certificate using the now incorrect DNS authentication plugin.

After finding a Porkbun-specific DNS plugin, I was able to update my certificate configuration and renew them.

Onwards!


GitHub - infinityofspace/certbot_dns_porkbun: Plugin for certbot to obtain certificates using a DNS TXT record for Porkbun domains

trashheap, to textbooks

Textbook Vendor Cengage owns and operates a platform called Ed2Go which looks to be a learning management platform to help with military career placement.

Cengage makes a lot of money. Like a lot. Most of these textbook vendors do. Cengage had 1.5 billion dollars in income in 2017 according to wikipedia.

So it's kinda funny to me that their knocking on doors at our university, trying to figure out who can help them setup the Let's Encrypt CNAME records for the subdomain they wanna setup under our university's domain.

Cause you know they need the free SSL certs.

uvok, to random
@uvok@furry.engineer avatar

Uhhhh? What?

I just set up as a reverse proxy for dendrite.

Mainly for automatic certificates.

I forgot to do ufw allow port 80 (or the equivalent), only allowing port 443.
And yet I got the certificate from

...

Reading the locks, the "tls-alpn-01" challenge was used? What's that? Never heard of it before.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • megavids
  • thenastyranch
  • magazineikmin
  • everett
  • InstantRegret
  • rosin
  • Youngstown
  • slotface
  • love
  • khanakhh
  • kavyap
  • tacticalgear
  • GTA5RPClips
  • DreamBathrooms
  • provamag3
  • modclub
  • mdbf
  • normalnudes
  • Durango
  • ethstaker
  • osvaldo12
  • cubers
  • ngwrru68w68
  • tester
  • anitta
  • cisconetworking
  • Leos
  • JUstTest
  • All magazines