!MthpOIxqJhTgrMNxDS:nixos.org

NixOS ACME / LetsEncrypt

86 Members
Another day, another cert renewal39 Servers

You have reached the beginning of time (for this room).


SenderMessageTime
1 Jun 2024
@k900:0upti.meK900I feel like some recent change made the ACME test way more flaky16:58:33
@k900:0upti.meK900Somewhere in the past few days16:59:25
3 Jun 2024
@arianvp:matrix.orgArian joined the room.08:07:27
@arianvp:matrix.orgArianapparently we merged a change that changes the account dir hash and is causing mass renewals and account id renewal?https://github.com/NixOS/nixpkgs/issues/316608 Anybody any idea how we can fix this before it causes more damage? Should we backport some conditional that uses the old hashing scheme based on stateVersion? Need to come up with some pragmatic solution08:09:44
@arianvp:matrix.orgArian TIL that toString null returns the string " " lol 08:10:17
@arianvp:matrix.orgArianNix is a special language for sure08:10:32
@k900:0upti.meK900Uhh08:10:58
@k900:0upti.meK900That's a very stupid behavior in lego tbh08:11:03
@arianvp:matrix.orgArianThis is not Lego. this is us08:11:10
@arianvp:matrix.orgArianI think?08:11:15
@k900:0upti.meK900Oh OK yeah it is us08:12:00
@k900:0upti.meK900https://github.com/SuperSandro2000/nixpkgs/blob/6e294f40db992635e4aa566789ac3560ed1f9b1a/nixos/modules/security/acme/default.nix#L1608:12:00
@arianvp:matrix.orgArian so acmeServer used to be null 08:12:19
@arianvp:matrix.orgArianand we change it to the letsencrypt uri08:12:35
@k900:0upti.meK900But how is it leaking into CAA records then08:13:01
@k900:0upti.meK900Is what I don't get08:13:03
@arianvp:matrix.orgArianYou can bind your CAA record to your account ID these days08:13:35
@k900:0upti.meK900Oh08:13:40
@arianvp:matrix.orgArianit's a new extension to ACME protocol08:13:42
@arianvp:matrix.orgArianto detect MITM attacks08:13:45
@k900:0upti.meK900Yeeeeeah08:13:58
@k900:0upti.meK900But then we can just migrate08:14:03
@k900:0upti.meK900Like08:14:11
@arianvp:matrix.orgArian(and it's important. E.g. German government has been issueing LEtsEncrypt certificates for a lot of XMPP servers through MITM'ing through middleboxes at Hetzner datacenters and got caught redhanded multiple times last year)08:14:15
@k900:0upti.meK900Compute old hash and new hash08:14:32
@k900:0upti.meK900In preStart08:14:34
@arianvp:matrix.orgArianmy idea was to make something like `${stateVersion < 23.11 ? " " : acmeServer}08:15:15
@k900:0upti.meK900

And then

if [ -d $oldHash ]; then 
  if [ ! -d $newHash ]; then
   mv $oldHash $newHash
  else
   echo "You are dedge please fix"
   exit 1
  fi
fi
08:15:25
@k900:0upti.meK900People who have two accounts need to manually adjust anyway08:15:56
@k900:0upti.meK900It's too late for them08:16:00

Show newer messages


Back to Room ListRoom Version: 6