!MthpOIxqJhTgrMNxDS:nixos.org

NixOS ACME / LetsEncrypt

96 Members
Another day, another cert renewal39 Servers

Load older messages


SenderMessageTime
20 Feb 2025
@hexa:lossy.networkhexaso at least we'd get immediate cert renewal if within a requested renewal window even if the cert was valid for longer than 30 days18:06:20
@hexa:lossy.networkhexa
   --ari-disable                             Do not use the renewalInfo endpoint (draft-ietf-acme-ari) to check if a certificate should be renewed. (default: false)
18:07:53
@thinkchaos:matrix.orgThinkChaos Did they remove --ari-enable or do they have both now? 😄 18:08:48
@emilazy:matrix.orgemilyis 0 "no wait" or "indefinite"?20:31:12
@hexa:lossy.networkhexano wait aiui20:55:07
@hexa:lossy.networkhexayes, ari is default on now and you can disable it20:55:20
21 Feb 2025
@emilazy:matrix.orgemily

You’ll also want to be sure your ACME client is running frequently - both for the sake of renewing short-lived certificates and so as to take advantage of ACME Renewal Information (ARI). ARI allows Let’s Encrypt to notify your client if it should renew early for some reason. ARI checks should happen at least once per day, and short-lived certificates should be renewed every two to three days, so we recommend having your client run at least once per day.

16:04:44
@emilazy:matrix.orgemilywonder if we should consider moving to 2×/day16:04:52
@emilazy:matrix.orgemily(https://letsencrypt.org/2025/02/20/first-short-lived-cert-issued/)16:04:57
22 Feb 2025
@m1cr0man:m1cr0man.comm1cr0manI mean we only ever had it > 1 day for LE's sake (DDOS) 😅 I don't see why we couldn't do 2x/day. Sorry just catching up on this all now. Was on holidays.00:26:31
@hexa:lossy.networkhexaideally we could configure the intervals relative to the total certificate lifetime14:50:52
@hexa:lossy.networkhexa* ideally we could configure the intervals relative to the total certificate lifetime provided by the profile14:51:01
@hexa:lossy.networkhexabut in the end it probably doesn't matter too much14:51:41
@hexa:lossy.networkhexaI still worry a bit about shortlived certs and CT logs14:52:13
@hexa:lossy.networkhexahttps://groups.google.com/a/mozilla.org/g/dev-security-policy/c/_335unOyteQ14:52:38
@arianvp:matrix.orgArianAs in. CT log performance?14:52:44
@hexa:lossy.networkhexa* I still worry a bit about shortlived certs and the impact on CT logs14:52:46
@hexa:lossy.networkhexayeah, they are these very big and slow platforms already14:52:54
@hexa:lossy.networkhexaand now we effectively allow people to recreate their certificates 15 times as much14:53:19
@hexa:lossy.networkhexa* and now we effectively allow people to recreate their certificates 15 times as often14:53:22
@emilazy:matrix.orgemilythe sunlight effort is making ct scale much better14:54:48
@emilazy:matrix.orgemilyhttps://sunlight.dev/14:55:04
@emilazy:matrix.orgemilyand has buy in from CT operators / Chrome / etc.14:55:15
@emilazy:matrix.orgemilyshouldn't be an issue14:55:24
@emilazy:matrix.orgemilyshorter lifetimes and better scalability are being coordinated across the entire ecosystem14:55:53
@emilazy:matrix.orgemilyactually it was internal LE systems that were considered the bottleneck to shorter issuance times for a long while, so I think the most recent development is just them starting to work on scaling their own issuance up14:56:43
@m1cr0man:m1cr0man.comm1cr0manAre the channel blocker tests defined in nixpkgs or somewhere else?19:47:11
@k900:0upti.meK900 ⚡️In nixpkgs, yes19:48:05
@k900:0upti.meK900 ⚡️What are you looking for?19:48:30
@m1cr0man:m1cr0man.comm1cr0manI want to replace the ACME test with two of the new individual tests in this PR https://github.com/NixOS/nixpkgs/pull/355087 (the http01-builtin and dns test)19:48:53

Show newer messages


Back to Room ListRoom Version: 6