PrivacyDigest, to privacy
@PrivacyDigest@mas.to avatar
mattbee, to random
@mattbee@mastodon.org.uk avatar

With , is there a mechanism for moving a site from one server to another where you can't access the private key on the old server? (e.g. from Netlify or other "managed" setup).

johnl,
@johnl@mastodon.social avatar

@mattbee you can setup a DNS record that delegates the acme challenge to a different endpoint. so you point that at your new server, and get a cert issued before you move: https://www.eff.org/deeplinks/2018/02/technical-deep-dive-securing-automation-acme-dns-challenge-validation

hypolite, to sysadmin

This morning my websites weren't loading because the Let's Encrypt certificates expired despite the auto-renewal I set up. It turns out I recently moved my domains from Gandi to Porkbun and certbot wasn't able to renew the certificate using the now incorrect DNS authentication plugin.

After finding a Porkbun-specific DNS plugin, I was able to update my certificate configuration and renew them.

Onwards!


GitHub - infinityofspace/certbot_dns_porkbun: Plugin for certbot to obtain certificates using a DNS TXT record for Porkbun domains

risottobias, to random

what if #sigstore #rekor or #letsencrypt #certificatetransparency distributed that info via gossip, DHT, or pubsub models?

I actually like the centralized ~3 entities, and it's great that it's not taking up huge amounts of CPU to do (compared to a proof of work)

but still... what if such data was discovered and published like a magnet link?

trashheap, to textbooks

Textbook Vendor Cengage owns and operates a platform called Ed2Go which looks to be a learning management platform to help with military career placement.

Cengage makes a lot of money. Like a lot. Most of these textbook vendors do. Cengage had 1.5 billion dollars in income in 2017 according to wikipedia.

So it's kinda funny to me that their knocking on doors at our university, trying to figure out who can help them setup the Let's Encrypt CNAME records for the subdomain they wanna setup under our university's domain.

Cause you know they need the free SSL certs.

uvok, to random
@uvok@furry.engineer avatar

Uhhhh? What?

I just set up as a reverse proxy for dendrite.

Mainly for automatic certificates.

I forgot to do ufw allow port 80 (or the equivalent), only allowing port 443.
And yet I got the certificate from

...

Reading the locks, the "tls-alpn-01" challenge was used? What's that? Never heard of it before.

yuki2501, to random

Atn admins:

Time to start working on allow lists and authorized fetch, folks.

We cannot stop Meta from trying to federate and control some instances. What we can do is establish new rules for federation.

The time to block unknown instances by default has come.

Start preparing.

kkarhan, (edited )
@kkarhan@mstdn.social avatar

@yuki2501 I know, but I also know how the internet works and that blocking PRISM snitches like all the |s is more realistic than manually allow-listing.
https://github.com/greyhat-academy/lists.d/blob/main/activitypub.domains.block.list.tsv

-based systems failed due to universal blockade by corporate interests - espechally the ...
Otherwise would've rightfully taken the place that has, because as the norm of CAs has nothing to do with at all...
https://en.wikipedia.org/wiki/CAcert.org

selea, (edited ) to linux

Since Google has announced the intention to reduce the maximum validation time for TLS-certificates frrom 398 days to 90 - I have spent the entire day testing out acme2certifier - basically a self-hosted ACME-server that can be used to act as a middleware/proxy against Lets Encrypt, ZeroSSL, Digicert and more - or even your own CA.

Turns out that it is well documented and quite easy to configure and set up :)

https://github.com/grindsa/acme2certifier/

european_alternatives, to Europe
@european_alternatives@mastodon.social avatar

🆕 Category with European/EU-based ACME SSL certificate providers (Let's Encrypt alternatives)
With Buypass Go SSL and ZeroSSL

https://european-alternatives.eu/category/acme-ssl-certificate-providers

jwildeboer, to random
@jwildeboer@social.wildeboer.net avatar

I just checked the certificates on my servers and those that needed it were all happily renewed automagically without any service interruption over the last few days. Nice :)

kikobar, to random
@kikobar@acc4e.com avatar

@jwildeboer I have been using S/MIME with since at least 2015.

Many of the reasons described in the forum are true, which does not mean S/MIME is impossible to fix or use.

There is native support for S/MIME in many email clients both desktop and mobile/tablet, including most of the 'stock' clients installed by default in most of the devices, so this is not an issue.

I think the big problems are basically 2:

1.- Having a throwaway key and certificate every 30 days (as we do with Letsencrypt SSL/TLS) is very inconvenient because we would need to keep a long collection of them in order access old messages.

2.- People access their email from multiple devices, so syncing the private key securely across all of them becomes a challenge.

For the tech savvy, both problems are manageable:

1.- You can get a free S/MIME certificate from valid for 1 year here:

https://www.actalis.com/s-mime-certificates.aspx


Please read a very important reply to this post by @duxsco pointing out to the insecurity of the Actalis certificate, and providing a secure but not free alternative.


2.- You can manually add this certificate to all your devices and keep an encrypted/secure repository with all your old keys and certificates in case you need to access your archived email.

I've been doing exactly that for years and it is just fine for signing my email.

IMHO for 'fixing' the whole signing and encryption of emails, is conceptually closer to be a more consistent solution, and I use it with everyone who understands it, but I have to admit that the ecosystems is far less ready than for S/MIME (you will need to use specialised apps or installed plugins, etc.), Thunderbird being a shining exception.

PGP has several very powerful advantages:

1.- You don't need a CA for the sole purpose of generating your keys.

2.- You can use the same keys for many years.

3.- People who really trust each other can sign each other's keys creating a web-of-trust.

4.- There is a free network of keyservers where you can upload your public keys and make them available to everyone.

5.- Most people these days have their own website, blog or social media account where they can publish their public keys for cases when they distrust the public servers. They can manually exchange them too.

In the long run I believe we should promote the adoption of OpenPGP instead of S/MIME, with more people using it, native support should follow.

I am not an expert though, so I'd love to hear from others too. 😊

  • All
  • Subscribed
  • Moderated
  • Favorites
  • anitta
  • thenastyranch
  • magazineikmin
  • everett
  • InstantRegret
  • rosin
  • Youngstown
  • slotface
  • love
  • khanakhh
  • kavyap
  • tacticalgear
  • GTA5RPClips
  • DreamBathrooms
  • megavids
  • modclub
  • mdbf
  • tester
  • Durango
  • ethstaker
  • osvaldo12
  • cubers
  • ngwrru68w68
  • provamag3
  • normalnudes
  • Leos
  • cisconetworking
  • JUstTest
  • All magazines