genebean, to selfhosted
@genebean@fosstodon.org avatar

I’m pretty stoked to see that there is support for doing a dns challenge to Gandi with the library uses to obtain Let’s Encrypt certificates for use with . This is going to be nice for a server that isn’t directly exposed to the internet.
[ ]

strobelstefan, to random German

Ein Let's Encrypt Zertifikat für die Nextcloud im eigenen Netzwerk

In diesem Beitrag geht es darum eine Nextcloud im eigenen Netzwerk mit einem offiziellen Let's Encrypt Zertifikat auszustatten, die eigentlich NICHT über das Internet erreichbar ist.

https://strobelstefan.de/blog/2023/12/10/ein_eigenes_lets_encrypt_zertifikat_f%C3%BCr_die_nextcloud_im_eigenen_netzwerk/

kzimmermann, to random
@kzimmermann@fosstodon.org avatar

In case anyone is wondering about how to "update" a valid certificate from that for some reason states is already expired, just run:

prosodyctl --root cert import /etc/letsencrypt/live

Assuming you have a valid certificate in place already configured for your domain. Saved me some headache!

More info: https://prosody.im/doc/letsencrypt

lexd0g, to random
@lexd0g@wetdry.world avatar

holy fucking shit bitwarden finally got passkeys

kkarhan,
@kkarhan@mstdn.social avatar

@ljrk @lexd0g SSL is trash because it requires value-removing middlemen aka. CAs to work and the inherent structures in IT cockblocked community-based CAs like for digital philantropy aka. @letsencrypt / ...

SSL is systemically bad and unfixable per design - period.

I don't see the added value of Passkeys over API-Keys, Login-Cookies and proper Login Managment...

jschauma, to random
@jschauma@mstdn.social avatar

Let's Encrypt will issue new intermediate certs in Q1/2024: https://groups.google.com/a/mozilla.org/g/dev-security-policy/c/L7XoAXt_s1c

Make sure your LE cert deployment logic includes serving the right intermediates that ACME should hand you, not just that same old LE intermediate you got years ago. Otherwise, there'll be breakage...

conansysadmin, to linux
@conansysadmin@mstdn.social avatar
rollin_rob, to email

Why isn't there something like but for certificates, so we could stop sending unencrypted mails? The S/MIME standard is built into almost every mail client, the only thing that's missing are the free certificates. Ok, and a smart software for renewal, but first things first.

irfan, (edited ) to Kubernetes

UPDATE: The service is accessible by its domain () as soon as I set the DNS server of my client machine to my PiHole. For other systems not using my local DNS (so outside my network), the domain remains unreachable. My suspicion is an issue with the Port Forwards, but idk what's wrong w em as it is.


Note: this may not be in the exact order. If the order to any of this is important, feel free to point that out.

  1. I've added to , to my zone (domain), the hostname foo pointing to my network's public IP.

  2. I've deployed everything you'd need including (which determines the dedicated Ingress private IP), -ingress (type set to LoadBalancer instead of NodePort), and -manager (with both HTTP/DNS clusterissuers). If you want to take a peek at how I've deployed/configured them, more details are on here: https://github.com/irfanhakim-as/orked.

  3. I've added foo.domain to the closest thing resembling to a DNS server that I have, , pointing to the dedicated Ingress private IP.

  4. I've set my router's only DNS server to the PiHole's IP.

  5. I've set all my Kubernetes nodes' (Masters and Workers) DNS1 to the Router's IP (DNS2 set to Cloudflare's, 1.1.1.1).

  6. I've created a port forwarding rule for HTTP on my router with 1) WAN Start/End ports set to 80, 2) Virtual Host port set to its nodePort (acquired from kubectl get svc -n ingress-nginx ingress-nginx-controller -o=jsonpath='{.spec.ports[0].nodePort}' i.e. 3XXXX), 3) Protocol set to TCP, and 4) LAN Host address set to the dedicated Ingress private IP.

  7. I've created a port forwarding rule for HTTPS on my router with 1) WAN Start/End ports set to 443, 2) Virtual Host port set to its nodePort (acquired from kubectl get svc -n ingress-nginx ingress-nginx-controller -o=jsonpath='{.spec.ports[1].nodePort}' i.e. 3XXXX), 3) Protocol set to TCP, and 4) LAN Host address set to the dedicated Ingress private IP.

  8. I've deployed a container service, and an Ingress for it, using 's DNS validation clusterissuer.

Current result:

  • Cert-manager creates a certificate automatically and is in a Ready: True state as expected.

  • The subdomain (foo.domain) however remains unreachable, no 404 errors, no nothing. Just "The connection has timed out" error.

  • Describing the container service's ingress (foo.domain), shows that it's stuck at "Scheduled for sync".

and experts - please tell me what I've done in any of this that were either wrong or unnecessary, or what I'm currently missing here for me to reach my goal of being able to get my container accessible via foo.domain through that Ingress. I suspect that I might be doing something wrong with this whole DNS mess I literally cannot fathom. I feel like I'm insanely close to getting this thing to work, but I fear I'm also insanely close of blowing up my brain.

cc: @telnetlocalhost (thanks for bearing w me and getting me this far)

conansysadmin, to opensource
@conansysadmin@mstdn.social avatar

By consulting the proper documents, one may speak a secure and secret tongue. #TLS #LetsEncrypt #OpenSource https://cromwell-intl.com/open-source/google-freebsd-tls/tls-certificate.html?s=mc

glynmoody, to random
@glynmoody@mastodon.social avatar

EU-wide digital wallet: MEPs reach deal with Council - https://www.europarl.europa.eu/news/en/press-room/20231106IPR09006/eu-wide-digital-wallet-meps-reach-deal-with-council this is an absolute disgrace, it will open up everyone in EU to invisible, unstoppable government surveillance. shame on @EU_Commission and @Europarl_EN #eidas #qwacs details: https://www.techdirt.com/2023/11/03/eu-tries-to-slip-in-new-powers-to-intercept-encrypted-web-traffic-without-anyone-noticing/

kkarhan,
@kkarhan@mstdn.social avatar

@quincy @thomasjorgensen @KatS @ErikJonker @glynmoody Well, @letsencrypt isn't that "community-run", at least not compared to which like the cockblocked out of existance or rather steam...

is their take but wothoit or a and instead a similar to what offered for some time...

greg, to random
@greg@clar.ke avatar

Let's Encrypt is apparently the Certificate Authority competitor Cloudflare trusts the most.

#CloudFlare #LetsEncrypt #SSL #CertificateAuthority

GossiTheDog, to random
@GossiTheDog@cyberplace.social avatar

Pretty incredible report here about what is likely lawful interception of TLS encrypted communications (used by basically every web service) targeted at an instant messaging service popular in Russia..

the TLS communications were being recertificated in the middle (similar to how enterprise firewalls do TLS decryption) for six months to snoop on communications.. it only got rumbled as somebody (drum roll) let the interception certificate expire by mistake.

https://notes.valdikss.org.ru/jabber.ru-mitm/

rugk,
@rugk@chaos.social avatar
scy, (edited ) to Germany
@scy@chaos.social avatar

Interesting. Apparently, both #Hetzner's and #Linode's German datacenters were used to #MitM connections to jabber.ru servers hosted there. There's a detailed postmortem here:
https://notes.valdikss.org.ru/jabber.ru-mitm/

I'd take these allegations with a grain of salt. But I must say that MitM'ing with a #LetsEncrypt certificate and then forgetting to renew it, leading to discovery, sounds like the most German law enforcement thing ever.

via https://devco.social/@ripienaar/111268338360338392

#Germany #Russia #jabberRU #jabber_ru

ge0rg, (edited ) to random
@ge0rg@chaos.social avatar

Detailed and credible looking report of on an server hosted at in Germany: https://notes.valdikss.org.ru/jabber.ru-mitm/

Looks like a transparent bridge was deployed in front of the actual server, obtained dedicated certificates from and MitMed all incoming client connections since July. It was discovered because the LE certificate expired 🤦

conansysadmin, to linux
@conansysadmin@mstdn.social avatar
danyork, to fediverse
@danyork@mastodon.social avatar

So, anyone have tips for installing the plugin on a multisite installation?

I have it working fine on a single WordPress instance, but I'm having a challenge on a multisite setup.

On the multisite server, in the primary site, I've installed and activated the AP plugin, but it's not working, and in Site Health I see:

> WebFinger endpoint is not accessible

> Your WebFinger endpoint https://danyork.me/.well-known/webfinger?resource=acct:danyork@danyork.me does not return valid JSON for application/jrd+json.

Any ideas?

danyork,
@danyork@mastodon.social avatar

YES! Some (partial) success! 🎉

Searching on and and , I found this great post from @perigee : https://geekblog.malcolmgin.com/2022/11/07/debugging-and-fixing-the-conflict-i-had-between-lets-encrypt-certificates-and-the-activitypub-plugin-for-wordpress-for-joining-the-fediverse/

They included the magic two lines I needed to add to .htaccess :

RewriteCond %{REQUEST_URI} ^/[.]well-known/webfinger.$
RewriteRule .
/wp-json/activitypub/1.0/webfinger [L]

BOOM! 🎉 Now I was able to make it work on two of the sites:

(All are empty because I need to write something there.)

BUT...

7/

danyork,
@danyork@mastodon.social avatar

But ... I was going to say it didn't work for my primary site, but IT DID! I just had to wait a couple of minutes (browser caching?) and... TA DA... I now have:

Victory!

So with the .htaccess ReWrite rules (see 7/ ☝️) , I now have plugin working on my WP Multisite server that uses

And... I've seen that all the duct tape and bubble gum holding together my various websites REALLY needs some attention. 🤦‍♂️

And.. I need to write!

8/

stevesplace, to mastodon
@stevesplace@mastodon.social avatar

Apparently nobody uses the source code. How about this? Is there anyone out there who is expert with nginx?

#mastodon #nginx #letsencrypt #certbot #nodejs #wtf

ifixcoinops, (edited ) to random
@ifixcoinops@retro.social avatar

Hey folks, is Prosody still the easiest way to self-host a server?

Please, please, please say it isn't

EDIT: use case is I have an Ubuntu box from Hetzner hosting some websites and (soon) a nextcloud, this is what I had set up on my last dedicated server (except owncloud back then) and the new box has Plesk on it and after just a couple of weeks of pressing buttons in Plesk and having it Do It All For Me I've been completely spoiled

EDIT 2: the root of the issue is that Plesk hides your .cert and .key files. Scrambles their names, removes their extensions and dumps them all under /opt/psa/certificates/ not even in different folders for different domains, you'd expect mydomain.com.cert but instead you get scfLios3a, all mixed up in a bucket with the eggs on top, good luck telling Prosody where to look for those buggers

debacle,
@debacle@framapiaf.org avatar

@jabberati @ifixcoinops @ejabberd @prosodyim

I found TLS certs, thanks to , relatively easy. YMMV.

ljrk, to random
@ljrk@todon.eu avatar

The small successes: Wrestled with my config to automatically re-write requests to <https://ljrk.org> to my blog at<https://www.blog.ljrk.org> (whiches domain is actually a CNAME to ljrk.codeberg.page), all with appropriate certificates for the base domain through and all.

izaya, to random
@izaya@social.shadowkat.net avatar

Aight so, Gandi's gone to shit, can anyone recommend a sane alternative with:

  • certbot plugins for DNS verification
  • hosted email
kkarhan,
@kkarhan@mstdn.social avatar

@izaya not shure if does support or tho...

Maybe @fuchsiii knows more...

Otherwise and offer and hosting...

cmsj, to linux

I run all of my homelab services in Docker, with SSL certs from LetsEncrypt. It's awesome, except when the cert renews and none of those services notice.

So, I add a label to those containers of net.tenshu.ssl=true

Then, I have a script in certbot's renewal-hooks/deploy/ which does this:

#!/bin/sh
apk update
apk add docker-cli
docker ps -f "label=net.tenshu.ssl" --format "{{ index .Names }}" | xargs docker restart

and they get restarted after each renewal!



unixtippse, to random German
@unixtippse@mastodon.online avatar

Auf https://secure.seat.es, dem Endpunkt für die Fahrzeug-API-Zugriffe bei und ist seit gestern mittag das - abgelaufen. Diese Kinderzimmer-IT kann sich doch kein Mensch ausdenken. Wir haben hier Kunden, für die betreiben wir Renewal und Monitoring ohne gesonderte Berechnung nebenbei, weil das so extrem wenig Aufwand ist. 🤦‍♂️

CleoQc, to security French
@CleoQc@mstdn.ca avatar

deleted_by_author

  • Loading...
  • peter,
    @peter@area51.social avatar

    @CleoQc I've seen quite a few large businesses use as their main certs.

    I know many complain about them being short lived (90 days) but they forget you can automate the renewals - still don't know why that one is an issue, although I have seen certs expire because it's not been done.

    kurisuchan, to Cybersecurity

    Within five minutes of requesting a new certificate from , a total of 50 different IPs hit my zero-traffic-other-than-me web server.

    Thanks to Certificate Transparency it's never been easier to get your honeypot discovered!

  • All
  • Subscribed
  • Moderated
  • Favorites
  • megavids
  • thenastyranch
  • magazineikmin
  • everett
  • InstantRegret
  • rosin
  • Youngstown
  • slotface
  • love
  • khanakhh
  • kavyap
  • tacticalgear
  • GTA5RPClips
  • DreamBathrooms
  • provamag3
  • modclub
  • mdbf
  • normalnudes
  • Durango
  • ethstaker
  • osvaldo12
  • cubers
  • ngwrru68w68
  • tester
  • anitta
  • cisconetworking
  • Leos
  • JUstTest
  • All magazines