!MthpOIxqJhTgrMNxDS:nixos.org

NixOS ACME / LetsEncrypt

106 Members
Another day, another cert renewal44 Servers

Load older messages


SenderMessageTime
21 Feb 2025
@emilazy:matrix.orgemilywonder if we should consider moving to 2×/day16:04:52
@emilazy:matrix.orgemily(https://letsencrypt.org/2025/02/20/first-short-lived-cert-issued/)16:04:57
22 Feb 2025
@m1cr0man:m1cr0man.comm1cr0manI mean we only ever had it > 1 day for LE's sake (DDOS) 😅 I don't see why we couldn't do 2x/day. Sorry just catching up on this all now. Was on holidays.00:26:31
@hexa:lossy.networkhexaideally we could configure the intervals relative to the total certificate lifetime14:50:52
@hexa:lossy.networkhexa* ideally we could configure the intervals relative to the total certificate lifetime provided by the profile14:51:01
@hexa:lossy.networkhexabut in the end it probably doesn't matter too much14:51:41
@hexa:lossy.networkhexaI still worry a bit about shortlived certs and CT logs14:52:13
@hexa:lossy.networkhexahttps://groups.google.com/a/mozilla.org/g/dev-security-policy/c/_335unOyteQ14:52:38
@arianvp:matrix.orgArianAs in. CT log performance?14:52:44
@hexa:lossy.networkhexa* I still worry a bit about shortlived certs and the impact on CT logs14:52:46
@hexa:lossy.networkhexayeah, they are these very big and slow platforms already14:52:54
@hexa:lossy.networkhexaand now we effectively allow people to recreate their certificates 15 times as much14:53:19
@hexa:lossy.networkhexa* and now we effectively allow people to recreate their certificates 15 times as often14:53:22
@emilazy:matrix.orgemilythe sunlight effort is making ct scale much better14:54:48
@emilazy:matrix.orgemilyhttps://sunlight.dev/14:55:04
@emilazy:matrix.orgemilyand has buy in from CT operators / Chrome / etc.14:55:15
@emilazy:matrix.orgemilyshouldn't be an issue14:55:24
@emilazy:matrix.orgemilyshorter lifetimes and better scalability are being coordinated across the entire ecosystem14:55:53
@emilazy:matrix.orgemilyactually it was internal LE systems that were considered the bottleneck to shorter issuance times for a long while, so I think the most recent development is just them starting to work on scaling their own issuance up14:56:43
@m1cr0man:m1cr0man.comm1cr0manAre the channel blocker tests defined in nixpkgs or somewhere else?19:47:11
@k900:0upti.meK900In nixpkgs, yes19:48:05
@k900:0upti.meK900What are you looking for?19:48:30
@m1cr0man:m1cr0man.comm1cr0manI want to replace the ACME test with two of the new individual tests in this PR https://github.com/NixOS/nixpkgs/pull/355087 (the http01-builtin and dns test)19:48:53
@k900:0upti.meK900Oh so all channels19:49:22
@k900:0upti.meK900https://github.com/NixOS/nixpkgs/blob/master/nixos/release-small.nix#L52 https://github.com/NixOS/nixpkgs/blob/master/nixos/release-small.nix#L138 https://github.com/NixOS/nixpkgs/blob/master/nixos/release-combined.nix#L7819:50:10
@m1cr0man:m1cr0man.comm1cr0manperrrfect. Will replace all those19:50:32
@arianvp:matrix.orgArianThanks so much for working on this btw21:08:23
@m1cr0man:m1cr0man.comm1cr0manWell thank you all for being patient with me 😅 it's been a long time coming, and I've had a lot of stuff going on IRL. It's pained me every time I have heard that the builds have been failing.21:23:32
@m1cr0man:m1cr0man.comm1cr0manThis is fully ready now I believe https://github.com/NixOS/nixpkgs/pull/355087 And the test suite PR should be fully ready once the ofborg tests pass (I want to validate it can still be run on demand).21:36:45
@arianvp:matrix.orgArianThis is the life of open source. Everything you write comes with NO WARRANTY WHATSOEVER. Happy we have a way forward. But no pressure21:59:27

Show newer messages


Back to Room ListRoom Version: 6