!MthpOIxqJhTgrMNxDS:nixos.org

NixOS ACME / LetsEncrypt

92 Members
Another day, another cert renewal43 Servers

Load older messages


SenderMessageTime
9 Feb 2023
@winterqt:nixos.devWinter (she/her)your judgement is trusted for a reason, and it seems that theyre not even responding to (or understanding?) your claims19:44:24
@m1cr0man:m1cr0man.comm1cr0manOkay yeah, I'll do that. Thanks :) 19:44:48
10 Feb 2023
@andreas.schraegle:helsinki-systems.deAndreas SchrägleHuh, I guessed correctly who that was before opening it. He's... not always easy to deal with, which kind of sucks, because he does sometimes contribute quite useful stuff.13:54:55
@hexa:lossy.networkhexayou would think there is a language barrier16:11:40
@hexa:lossy.networkhexabut sometimes the communication works quite flawlessly16:11:48
12 Feb 2023
@m1cr0man:m1cr0man.comm1cr0man:( They are not happy about me closing the PR18:18:54
@m1cr0man:m1cr0man.comm1cr0man I'm trying to figure out if it would solve this but I don't think it does. At least then it has some technical merit beyond "keep the generated config cleaner" 18:25:07
@m1cr0man:m1cr0man.comm1cr0manOh right I finally understand 180980 properly, better than I did in September :P 18:31:20
@m1cr0man:m1cr0man.comm1cr0manThere, I left a big reply in 199033, I did out a truth table for his proposal, which a) took way too long to figure out the implications and b) turned out to be needlessly complicated and I would think harmful to some existing configs.20:25:04
16 Feb 2023
@m1cr0man:m1cr0man.comm1cr0manHm, interesting https://github.com/NixOS/nixpkgs/issues/216487 I'll do my best to explain why it exists.09:29:55
@m1cr0man:m1cr0man.comm1cr0manTldr the conditionPathExists is needed to ensure successful reload when vhosts with new certs are added, and it performs batching too09:32:27
@m1cr0man:m1cr0man.comm1cr0manActually, there might be a way to reduce the number of reloads with some file touching09:35:22
@m1cr0man:m1cr0man.comm1cr0manBut that's extra complexity to solve a non issue afaik. What harm does extra reloading do?09:35:55
23 Feb 2023
@raitobezarius:matrix.orgraitobezariusBreaking TCP connections basically05:04:00
@raitobezarius:matrix.orgraitobezariusHm no reload keeps the existing ones *05:04:40
4 Mar 2023
@raitobezarius:matrix.orgraitobezarius

I have a NixOS test using curl to test TLS-related stuff:

webserver # * Server certificate:
webserver # *  subject: CN=*.test.nix
webserver # *  start date: Jan 30 03:41:18 2023 GMT
webserver # *  expire date: Jan 30 03:41:18 2043 GMT
webserver # *  subjectAltName does not match direct.noproxy.test.nix
webserver # * SSL: no alternative certificate subject name matches target host name 'direct.noproxy.test.nix'

I am using ACME snakeoil certs, but for some reason, my wildcard cert with CN=.test.nix and SAN=[.test.nix] is not considered as valid by curl, though openssl -showcerts -connect validates the chain properly… (I used security.pki.certificateFiles)

19:41:47
@raitobezarius:matrix.orgraitobezarius Does anyone understand how I can get curl to debug this or is it an instance of curl failing because the CN contain * and this is not really allowed? 19:42:06
@raitobezarius:matrix.orgraitobezariusIt seems like minica is doing this and I have no real control over this19:42:14
@raitobezarius:matrix.orgraitobezarius CN=*.test.nix and SAN=[*.test.nix] * 19:44:03
@m1cr0man:m1cr0man.comm1cr0manhave you passed the snakeoil root CA into the CA bundle for curl?20:01:33
@m1cr0man:m1cr0man.comm1cr0manoh wait I see what's wrong - you actually can't use a wildcard for 2+ nested domains20:01:51
@m1cr0man:m1cr0man.comm1cr0mannoproxy.test.nix would work, direct-noproxy.test.nix would also work, but what you have is invalid, you would need a wildcard for that subdomain20:02:16
@raitobezarius:matrix.orgraitobezariusAaaaah22:52:53
@raitobezarius:matrix.orgraitobezarius Thanks m1cr0man:! 22:53:21
@m1cr0man:m1cr0man.comm1cr0manNo bother! :) 22:53:36
6 Mar 2023
@hexa:lossy.networkhexahttps://hydra.nixos.org/log/fn9hp25w7h8na36gfyqkrfpfmlrffksj-vm-test-run-acme.drv08:15:38
@hexa:lossy.networkhexaon unstable-small08:15:41
@hexa:lossy.networkhexa

https://hydra.nixos.org/log/fn9hp25w7h8na36gfyqkrfpfmlrffksj-vm-test-run-acme.drv

08:15:46
@hexa:lossy.networkhexa *

Test "Can request certificate with Lego's built in web server" failed with error: "unit "acme-finished-http.example.test.target" is inactive and there are no pending jobs"

08:15:51
@m1cr0man:m1cr0man.comm1cr0manAmazing thank you for catching that11:25:34

Show newer messages


Back to Room ListRoom Version: 6