|
I did the let's encrypt thing for a season and found it fiddly. I prefer to have to renew once a year so I went and got a real wildcard as they are pretty cheap today.
|
|
|
|
|
I tried other stuff to have IIS/Windows autorenew (wildcard) - but not CertifyTheWeb - I will try it out and if it works I am going to owe you a beer.
If not I will just keep on drinking myself
|
|
|
|
|
IIRC, the trick in IIS was app pool permissions on the .well-known/acme-challenge folder. Good luck!
"Go forth into the source" - Neal Morse
"Hope is contagious"
|
|
|
|
|
Why are certs required? Who's the sheriff?
"A little time, a little trouble, your better day"
Badfinger
|
|
|
|
|
your browser will default to https these days. sites pretty much have to support SSL.
To err is human. Fortune favors the monsters.
|
|
|
|
|
So certs are the badge of a secure website and the right to claim "https".
That relationship is not obvious. Thanx.
"A little time, a little trouble, your better day"
Badfinger
|
|
|
|
|
A bit more than that. The https protocol is not just a "label", it's an actual protocol, and the handshaking involves the sharing of the certificate with the requester. So the cert is an integral part of the SSL protocol. No cert, HTTPS doesn't even begin to work.
|
|
|
|
|
Not sure which browser you're using but Edge, Chrome (unless it was in the update this week), and Firefox don't default to SSL. They do check for a certificate first and then warn you if you're going to an https URL and there's no certificate.
|
|
|
|
|
the heck it doesn't. It wants to do it unless i explicitly type http:// in the address bar. I always have to fiddle with that when i'm calling web stuff off an esp32 which doesn't do ssl
To err is human. Fortune favors the monsters.
|
|
|
|
|
You need to go into Options and uncheck the "Screw up randomly" box.
Or use sudo scrwuprnd off
|
|
|
|
|
honey the codewitch wrote: Maybe some of you know why waving a dead chicken over linux never works, but I don't.
Windows is a proprietary O/S, so waving proprietary dead chickens over it works. Linux is an open-source O/S; you need to open-source your dead chickens.
Freedom is the freedom to say that two plus two make four. If that is granted, all else follows.
-- 6079 Smith W.
|
|
|
|
|
...also, which dead chicken you use is dependent on your distro. When in doubt, you may have to try all 500+ of them... but try them quickly. The longer you wait, the more seem to hatch!
|
|
|
|
|
Waving dead chickens over windows works but with Linux you must use a dead penguin.
|
|
|
|
|
I have 3000+ domains on IISs behind multiple HAProxyeis and NGinxs.
One Windows VM is responsible for the creations and renewal of all certs on all Proxies using custom C#.
(Keeps the date of last renew, renews, saves on proxy via SFTP, reloads proxy via SSH)
A certificate is renewed every 60 days, if it fails i get warned and have 30 days to solve the problem.
It never fails on LetsEncrypt, it is always because the Domain DNSs are wrong or something like that.
Commercial/Adminstrative people add or remove clients (domains) at will and i never have to handle any of that.
I absolutely love LetsEncrypt. No way i would renew 3000 domains manually.
Tip: Don't stop NGinx, just reload it. (i assume certbot will not complain)
If something fails on the renew, the site is still up with the old cert.
|
|
|
|
|
certbot won't run if something is bound to the http ports
To err is human. Fortune favors the monsters.
|
|
|
|
|
Ahh. OK.
I have only one certbot in a Raspberry PI at home but is running as a service/daemon.
I do not remember what i done, but it keeps renewing the cert by it self.
Nothing gets added or removed from that PI, so it not a good comparison.
But i find strange (a lot) that webserver has to stop to renew the cert.
Renewing many sites takes a lot of time and no way the downtime is acceptable.
Don't know what it is, but something is up.
|
|
|
|
|
Yeah probably ugly, although most larger sites are load balanced so in theory it should be possible to update a node at a time without downtime for a site like that.
But I share your confusion as to why the site needs to be stopped.
To err is human. Fortune favors the monsters.
|
|
|
|
|
I've ad better luck with rubber chickens.
|
|
|
|
|
honey the codewitch wrote: why the heck do we need to encrypt all web traffic these days? Because Google decreed that it should be so.
If you think 'goto' is evil, try writing an Assembly program without JMP.
|
|
|
|
|
to answer that question of WHY SSL.
Because we need some privacy in what we are doing.
Before SSL, every man in the middle knew every search, your passwords to FTP and your email passwords (no ENCODING is not encryption, LOL).
So, now only GOOGLE (or your browser) can sell your URL hits if they are not tracked elsewhere (usually by google, fb, etc).
This is a step in the right direction. I use apache, and the process (as mentioned elsewhere) is pretty clean. My chief tech automated it years ago, never noticed it. It just works. Thankfully. (Of course my published site is very touchy, you don't get a 404 error. You get firewall BLOCKED for 72hrs, got tired of robo attacks, lol. Oh, outside of the us, it could be a 30 day ban! (99% of my web traffic was simply attack bots checking for phpmysql, etc)).
Spend the time to make sure you have the configuration right, and easier to update, it's clearly worth it.
But we need SSL. EVERYTHING over the internet should use strong encryption. The fact that we SUCK at it... Is kinda on us... We spend very little time playing with it, and just want it to work.
|
|
|
|
|
Yeah, all of this.
Although once traffic is "on the inside" I think people do tend to keep it SSL and this is probably a little bit bad/irrelevant/overkill. Encryption/decryption doesn't come for free. Let the API gateways/load balancers handle it.
My mouth stood agape at a line in Microsoft docs recently for a specific kind of containerization on Azure where they say applications don't have to and should not implement SSL. I have to think their thinking is much like the sentiment above.
However, it IS maybe a notably different animal to be able to sniff your own traffic.
|
|
|
|
|
Agreed, but remember that for DECADES our poor practices at protecting thing (Storing passwords clear text in DBs associated with the users, shoving them in COOKIES (OMG) as opposed to some GUID), and thinking we can ADD security later.
You know, like we can ADD performance Later... (Every project I've seen with that attitude suffered massive performance issues. You DESIGN for performance, you implement with care. If speed is important, then it's part of the CONTRACT and TRACING).
If Security is remotely important. It's got to be part of the contract.
And in todays world. Let's ASSUME that a LACK of security is a NON-STARTER.
The tools are getting easier/better. But people still not understanding which is the PRIVATE KEY and which is the PUBLIC KEY is getting old. (of course calling them both key files, and sometimes .key or no extension doesn't help, but the .pub should be pretty obvious).
--> We've come a VERY LONG way since the 1940s (Pre-Fortran). C, C++ (Objects), (Frameworks), and more!
I have hope!
|
|
|
|
|
You likely have a few more grey hairs than I. But I did write some Fortran... in high school.
It should be relatively easy to make something configured only for SSL work without it. It's removing complexity vs adding it. Mostly that complexity is abstracted from the developer into configuration details with libraries and frameworks handling the nitty gritty of hand shakes and certificates. In most cases, I'd guess the developer need only do configurational things and provide appropriate files. "Only"... heh.
It is the case that some recent work was approached in just that way which is why I'm aware of the contextual "no don't do SSL" from Microsoft.
Performance is a tricky thing. I don't disagree about designing with it in mind, but I might be wary of getting terribly caught up in "pre-optimization". It's maybe sometimes easier to see what needs the most grease once the machine is running.
My gut says it tends less to be that things weren't designed with performance in mind. The modern development practice of trying to reuse every wheel possible while creating as few purpose built ones as one can get away with? We had a frame, wheels, chain, gear, and pedals so we rather efficiently glue them all together in Henry Ford fashion. But then we find we are riding a 1-speed bike up a hill.
Moore's law and related meant we got way more resources than we needed and we leveraged them. Perfection took a far back seat to productivity. Regardless of where that falls on one's bad<->understandable<->good line, it does mean that a sizeable majority have never had to think very much about it at all.
|
|
|
|
|
why do we need privecy?
because years ago someone complained about someone walking around naked, they were chill with it, if you dont want to look thats on you. but nah, all the offended people got together and said, NO, privates should be covered by default we making some laws about it, then everyone like ok and followed along.
Its more the 1 person that was taking pictures of other naked people in public, which if they didnt go and share it out with everone else, probably would have been an issue, but they did, and complaints were made.
the real annoying part is when its your own local home and its still like no, you gotta go extra steps if want to be un clothed here. but I own this, I know this place, its okay. No your password for localhost appears on a leak list, imma be dumb and not filter out admin admin for localhost
|
|
|
|
|
Maze,
You are clearly missing the point.
Did you know the IRS has a rule that they can use ILLEGALLY Obtained information against you?
I used to be you! (Since I don't break the law, what do I care!)
Here is the simplest example. Given JUST the data the government admits it collects from Cellphone data...
I can geofence rich neighborhoods, and houses, and EXPENSIVE hotels nearby. I can now calculate who is having affairs.
Where they live, who they are having the affair with. Where both people work and live. In Bulk, in MINUTES.
Now, I knock on your door, and I confront you, and suggest your wife need not know, if you DONATE a reasonable sum to my political campaign, or whatever. (Having an affair is NOT ILLEGAL). Being extorted is. But you are powerless. BTW, they know enough to destroy your career. (FWIW, I've seen this very tactic, and years long legal fees sponsored by our own government used).
How about framing you for a crime you did not commit. But they used your cellphone data (In advance of trumping up the charges to put you in the area, where they knew you had no alibi).
This data can be used to solve crimes, or to implicate people. Our constitution is SUPPOSED to protect us.
It does not! Because they don't have to WIN the lawsuit. The person I know, did NOT lose the case. But they lost MILLIONS and had to step down from their position.
And how about CA... They "accidentally" published FULL ID information on all concealed carry people (I think in one county). Addresses, DOBs, License #s, and type of weapon.
Think LONG AND HARD... Would you be comfortable knowing that ALL of the information about you, that is stored on your computer, in your emails, including Bank Account #s, ids, ssn, etc. Were available for sale? Along with your Cell Phone data?
|
|
|
|
|