!MthpOIxqJhTgrMNxDS:nixos.org

NixOS ACME / LetsEncrypt

111 Members
Another day, another cert renewal48 Servers

You have reached the beginning of time (for this room).


SenderMessageTime
5 Mar 2022
@winterqt:nixos.devWinter (she/her)like i guess it's just about reducing attack surface no matter the setup19:55:18
@m1cr0man:m1cr0man.comm1cr0manwell if you aren't using wildcards its more apparent - certs for each service, with the group assigned appropriately19:55:39
@winterqt:nixos.devWinter (she/her) but giving the acme group won't give access to those? 19:55:58
@winterqt:nixos.devWinter (she/her)that's the point i'm trying to make, unless i'm wrong19:56:07
@m1cr0man:m1cr0man.comm1cr0manyeah but then you're granting acme group to N service accounts rather than just setting the cert group19:56:14
@winterqt:nixos.devWinter (she/her)right19:56:36
@m1cr0man:m1cr0man.comm1cr0man it's definitely easier for end users to set the cert group, hence that group = mkDefault cfg.group in the nginx/httpd cert config 19:56:45
@m1cr0man:m1cr0man.comm1cr0man * it's definitely easier for end users to set the cert group, hence that group = mkDefault cfg.group in the nginx/httpd cert config rather than add a user to a group 19:56:57

Show newer messages


Back to Room ListRoom Version: 6