[Systems] Letsencrypt

Bernie Innocenti bernie at codewiz.org
Wed Mar 9 15:35:43 EST 2016


On 01/03/16 17:28, Samuel Cantero wrote:
> We are automating the renewal process with the official one. You can
> check this on https://wiki.sugarlabs.org/go/Sysadmin/Letsencrypt
> 
> In case you find simp_le a lot better, please share the info in our wiki :)

Haven't found the time to try it yet, but here is some news about the
(formerly) official Letsencrypt client:

  https://letsencrypt.org/2016/03/09/le-client-new-home.html


> Regards,
> 
> Samuel.
> 
> On Mon, Feb 29, 2016 at 11:14 PM, Sebastian Silva
> <sebastian at fuentelibre.org <mailto:sebastian at fuentelibre.org>> wrote:
> 
>     Lol. I didn't think to try to look for alternative letsencrypt
>     clients, but I've used the official one a few times. However I have
>     to renew in March so I'm also looking to automate this. Thanks for
>     the research! I think I'll try /simp_le/ and share :-)
> 
>     Regards,
>     Sebastian
> 
> 
>     On 29/02/16 20:53, Bernie Innocenti wrote:
>>     Great, thanks for taking care of this and for the update.
>>
>>     Dumb question: which letsencrypt client are we using? There are a number
>>     of options:
>>
>>       https://community.letsencrypt.org/t/list-of-client-implementations/2103
>>
>>     A couple of weeks ago, I wanted to setup letsencrypt for codewiz.org <http://codewiz.org>,
>>     but the official one seemed quite overengineered, so I tried
>>     letsencrypt-nosudo instead. The problem with the nosudo script is that
>>     it's designed for interactive renewal when the user key is kept offline
>>     (a prudent measure, but I'm too lazy for that :-).
>>
>>     The next ones I'd like to try are:
>>
>>       https://github.com/kuba/simp_le
>>       https://github.com/lukas2511/letsencrypt.sh
>>
>>
>>     Anyway, I'm shocked by how many weird ways exist to do something as
>>     simple as generating an SSL certificate and getting it signed by a CA
>>     with a challenge. What are your impressions?
>>
>>
>>     On 02/29/2016 11:04 AM, Samuel Cantero wrote:
>>>     Hi,
>>>
>>>     I was testing our access to the .well-known/acme-challenge directory for
>>>     www.slo <http://www.slo> and nagios.slo. LE must have access to this directory in order
>>>     to validate the domain with a set of challenges (in this case
>>>     provisioning an HTTP resource under this URI). This access wasn't
>>>     working. I fixed it for http and https. Now, we are also forcing https
>>>     for all pages except domain/.well/known-challenge. It was forcing https
>>>     for all pages.
>>>
>>>     In addition, sometime ago we defined in nginx the same directory for the
>>>     acme-challenge for both domains but we forgot to set the same webroot in
>>>     the LE config file for each domain. I also fixed this.
>>>
>>>     I tested all this config with the nagios domain and the certificate was
>>>     renewed successfully. I also changed in the renewal script the renewal
>>>     time. We defined to renew the SSL certificate 15 days before the
>>>     expiration day. I changed this to 30 in order to validate the process
>>>     with the www.slo <http://www.slo> domain in 3 days. www.slo <http://www.slo> certificate was issued on
>>>     January 3 and is going to expire on April 2.
>>>
>>>     Best regards,
>>>
>>>     Samuel C.
>>>
>>>     On Fri, Feb 26, 2016 at 10:56 PM, Bernie Innocenti <bernie at codewiz.org <mailto:bernie at codewiz.org>
>>>     <mailto:bernie at codewiz.org> <mailto:bernie at codewiz.org>> wrote:
>>>
>>>         Sam, could you make the renew-certs-le not produce any output when
>>>         everything goes well and only nag if we need to fix something?
>>>
>>>         -------- Forwarded Message --------
>>>         Subject: Cron <root at freedom> test -x /usr/sbin/anacron || ( cd / &&
>>>         run-parts --report /etc/cron.daily )
>>>         Date: Fri, 26 Feb 2016 08:00:07 -0500 (EST)
>>>         From: Cron Daemon <root at freedom.sugarlabs.org <mailto:root at freedom.sugarlabs.org>
>>>         <mailto:root at freedom.sugarlabs.org>
>>>     <mailto:root at freedom.sugarlabs.org>>
>>>         To: root at freedom.sugarlabs.org <mailto:root at freedom.sugarlabs.org> <mailto:root at freedom.sugarlabs.org>
>>>     <mailto:root at freedom.sugarlabs.org>
>>>
>>>         /etc/cron.daily/renew-certs-le:
>>>         The certificate for nagios.sugarlabs.org <http://nagios.sugarlabs.org>
>>>         <http://nagios.sugarlabs.org> <http://nagios.sugarlabs.org> is up to date, no need for
>>>         renewal (36 days left for renewal).
>>>         The certificate for sugarlabs.org <http://sugarlabs.org> <http://sugarlabs.org> <http://sugarlabs.org> is up to
>>>         date, no need for renewal (36
>>>         days left for renewal).
>>>         /etc/cron.daily/wizbackup:
>>>         1456488867:lightwave.sugarlabs.org:0:255
>>>         run-parts: /etc/cron.daily/wizbackup exited with return code 1
>>>
>>>
>>>         _______________________________________________
>>>         Systems mailing list
>>>         Systems at lists.sugarlabs.org <mailto:Systems at lists.sugarlabs.org> <mailto:Systems at lists.sugarlabs.org>
>>>     <mailto:Systems at lists.sugarlabs.org>
>>>         http://lists.sugarlabs.org/listinfo/systems
>>>
>>>
> 
>     -- 
>     I+D SomosAzucar.Org
>     "icarito" #somosazucar en Freenode IRC
>     "Nadie libera a nadie, nadie se libera solo. Los seres humanos se liberan en comuniĆ³n" - P. Freire
> 
> 


-- 
 _ // Bernie Innocenti
 \X/  http://codewiz.org


More information about the Systems mailing list