!MthpOIxqJhTgrMNxDS:nixos.org

NixOS ACME / LetsEncrypt

107 Members
Another day, another cert renewal43 Servers

Load older messages


SenderMessageTime
21 Feb 2025
@emilazy:matrix.orgemily

You’ll also want to be sure your ACME client is running frequently - both for the sake of renewing short-lived certificates and so as to take advantage of ACME Renewal Information (ARI). ARI allows Let’s Encrypt to notify your client if it should renew early for some reason. ARI checks should happen at least once per day, and short-lived certificates should be renewed every two to three days, so we recommend having your client run at least once per day.

16:04:44
@emilazy:matrix.orgemilywonder if we should consider moving to 2×/day16:04:52
@emilazy:matrix.orgemily(https://letsencrypt.org/2025/02/20/first-short-lived-cert-issued/)16:04:57
22 Feb 2025
@m1cr0man:m1cr0man.comm1cr0manI mean we only ever had it > 1 day for LE's sake (DDOS) 😅 I don't see why we couldn't do 2x/day. Sorry just catching up on this all now. Was on holidays.00:26:31
@hexa:lossy.networkhexaideally we could configure the intervals relative to the total certificate lifetime14:50:52
@hexa:lossy.networkhexa* ideally we could configure the intervals relative to the total certificate lifetime provided by the profile14:51:01
@hexa:lossy.networkhexabut in the end it probably doesn't matter too much14:51:41
@hexa:lossy.networkhexaI still worry a bit about shortlived certs and CT logs14:52:13
@hexa:lossy.networkhexahttps://groups.google.com/a/mozilla.org/g/dev-security-policy/c/_335unOyteQ14:52:38
@arianvp:matrix.orgArianAs in. CT log performance?14:52:44
@hexa:lossy.networkhexa* I still worry a bit about shortlived certs and the impact on CT logs14:52:46
@hexa:lossy.networkhexayeah, they are these very big and slow platforms already14:52:54
@hexa:lossy.networkhexaand now we effectively allow people to recreate their certificates 15 times as much14:53:19
@hexa:lossy.networkhexa* and now we effectively allow people to recreate their certificates 15 times as often14:53:22
@emilazy:matrix.orgemilythe sunlight effort is making ct scale much better14:54:48
@emilazy:matrix.orgemilyhttps://sunlight.dev/14:55:04
@emilazy:matrix.orgemilyand has buy in from CT operators / Chrome / etc.14:55:15
@emilazy:matrix.orgemilyshouldn't be an issue14:55:24
@emilazy:matrix.orgemilyshorter lifetimes and better scalability are being coordinated across the entire ecosystem14:55:53
@emilazy:matrix.orgemilyactually it was internal LE systems that were considered the bottleneck to shorter issuance times for a long while, so I think the most recent development is just them starting to work on scaling their own issuance up14:56:43
@m1cr0man:m1cr0man.comm1cr0manAre the channel blocker tests defined in nixpkgs or somewhere else?19:47:11
@k900:0upti.meK900In nixpkgs, yes19:48:05
@k900:0upti.meK900What are you looking for?19:48:30
@m1cr0man:m1cr0man.comm1cr0manI want to replace the ACME test with two of the new individual tests in this PR https://github.com/NixOS/nixpkgs/pull/355087 (the http01-builtin and dns test)19:48:53
@k900:0upti.meK900Oh so all channels19:49:22
@k900:0upti.meK900https://github.com/NixOS/nixpkgs/blob/master/nixos/release-small.nix#L52 https://github.com/NixOS/nixpkgs/blob/master/nixos/release-small.nix#L138 https://github.com/NixOS/nixpkgs/blob/master/nixos/release-combined.nix#L7819:50:10
@m1cr0man:m1cr0man.comm1cr0manperrrfect. Will replace all those19:50:32
@arianvp:matrix.orgArianThanks so much for working on this btw21:08:23
@m1cr0man:m1cr0man.comm1cr0manWell thank you all for being patient with me 😅 it's been a long time coming, and I've had a lot of stuff going on IRL. It's pained me every time I have heard that the builds have been failing.21:23:32
@m1cr0man:m1cr0man.comm1cr0manThis is fully ready now I believe https://github.com/NixOS/nixpkgs/pull/355087 And the test suite PR should be fully ready once the ofborg tests pass (I want to validate it can still be run on demand).21:36:45

Show newer messages


Back to Room ListRoom Version: 6