!MthpOIxqJhTgrMNxDS:nixos.org

NixOS ACME / LetsEncrypt

93 Members
Another day, another cert renewal43 Servers

Load older messages


SenderMessageTime
13 Jun 2023
@m1cr0man:m1cr0man.comm1cr0manI was thinking/hoping we could generate them yeah :) 20:55:44
@emilazy:matrix.orgemily
In reply to @emilazy:matrix.org
(in terms of "ACME quality of implementation and best operational practices" I think Caddy has very few competitors and would solve a lot of our problems; we can start up a single long-running daemon and get rid of basically all our gross shell logic. but it's not all sunshine and roses; for one thing, using DNS providers would require us to have a story for Caddy modules (though we could probably just build a mega-ACME-Caddy with all the first-party providers out of the box), and also you can certainly do better in terms of hardening (Go is memory safe, but AFAIK there's no privilege separation going on: it's possible that exploits could leak private key material through confused deputy or Go runtime exploits))
(another caveat is no multiple-SAN certificates which I forget if we even support and are not considered best practice (cf. https://github.com/https-dev/docs/blob/a00aed0ec4a6e7963fde33aeda725209bfa4a89d/acme-ops.md#use-one-name-per-certificate from the developers). but if we do support them I'm sure somebody is using them.)
20:59:39
@m1cr0man:m1cr0man.comm1cr0manoh, no we use SANs quite a bit. extraDomainNames puts them all in as SANs effectively. For example nginx does it by default https://github.com/NixOS/nixpkgs/blob/nixos-unstable/nixos/modules/services/web-servers/nginx/default.nix#L129321:15:50
@k900:conduit.0upti.meK900 (deprecated) joined the room.21:36:39
@emilazy:matrix.orgemilywe should probably consider not doing it by default :)21:50:27
@emilazy:matrix.orgemilybut that's another matter21:50:30
15 Jun 2023
@k900:conduit.0upti.meK900 (deprecated)https://hydra.nixos.org/build/22421820513:16:42
@k900:conduit.0upti.meK900 (deprecated)Test failed again13:16:44
@k900:conduit.0upti.meK900 (deprecated)Not restarting cause there's multiple evals queued after that already13:17:03
@hexa:lossy.networkhexa

Test "Can request certificate with Lego's built in web server" failed with error: "unit "acme-finished-http.example.test.target" is inactive and there are no pending jobs"

13:26:26
@hexa:lossy.networkhexa
In reply to @hexa:lossy.network

Test "Can request certificate with Lego's built in web server" failed with error: "unit "acme-finished-http.example.test.target" is inactive and there are no pending jobs"

same as here 🥳
13:26:38
@hexa:lossy.networkhexasaved to https://gist.github.com/mweinelt/0bf207904ea0a32e30f0aadd3e0b1bba13:27:07
@mon:tchncs.deribosomerocker joined the room.16:40:24
19 Jun 2023
@arianvp:matrix.orgArianhttps://github.com/systemd/systemd/issues/2807510:43:36
@emilazy:matrix.orgemilyheh, convenient10:56:36
@raitobezarius:matrix.orgraitobezariussystemd folks seemed more interested to implement this via implementing service limits on a slice13:02:23
@emilazy:matrix.orgemilyon the issue or through your own communication with systemd people?13:10:33
@emilazy:matrix.orgemilyI think on the issue we were just pushing back on "more bespoke complexity in the service scripts" by all means necessary :p13:10:49
@raitobezarius:matrix.orgraitobezariuson the systemd dev chat13:12:04
@raitobezarius:matrix.orgraitobezariuss/systemd folks/poettering13:12:24
@emilazy:matrix.orgemilyright13:22:29
@emilazy:matrix.orgemily
In reply to @m1cr0man:m1cr0man.com

okay yeah, so these are pretty lenient for most people. I think I was only concerned about the concurrent one that the ticket opener mentioned:

the “new-nonce”, “new-account”, “new-order”, and “revoke-cert” endpoints on the API have an Overall Requests limit of 20 per second.

Right now this one is very easy to do

tbh given ^ and the other limits we discussed at that time, some kind of time-based limits might be what we'd really want
13:23:05
@emilazy:matrix.orgemily"N instances of this service per X period of time"13:23:17
@emilazy:matrix.orgemilyi'm guessing systemd probably wouldn't go for that though13:23:22
28 Jun 2023
@lehmanator:gnulinux.club@lehmanator:gnulinux.club joined the room.19:28:06
30 Jun 2023
@m1cr0man:m1cr0man.comm1cr0manI have this really old PR to add useACMEHosts to opensmtpd. Anyone care to review? https://github.com/NixOS/nixpkgs/pull/12326121:36:29
8 Jul 2023
@k900:conduit.0upti.meK900 (deprecated)Found a new test failure mode: https://gist.github.com/K900/991b5c2b7b0637bf31237becf306662012:32:03
10 Jul 2023
@hexa:lossy.networkhexaShortening the Let's Encrypt Chain of Trust - https://letsencrypt.org/2023/07/10/cross-sign-expiration.html22:49:11
@hexa:lossy.networkhexaNo more cross signing in 202422:49:32
@emilazy:matrix.orgemilyyay22:54:29

Show newer messages


Back to Room ListRoom Version: 6