I’ve been downloading SSL certificates from my domain provider, using cat to join them together to make the fullchain.pem, uploading them to the server, and myself adding a 90 day calendar reminder. Every time I did this I’d think I should find out about this Certbot thing.

Well, I finally got around to it, and it was one of those jobs which turns out to be so easy you wish you’d done it ages ago.

The install was simple (I’m using nginx/ubuntu).

It scans up your server conf files to see which sites are being served, asks you a couple of questions, obtains the Let’s Encrypt certificate for them, installs it, updates your conf files to use it, and sets up a cron job to check if it’s time to renew the certificate, which it will also do auto-magically.

I was so pleased with it I made a donation to the EFF for it, then I started to think about how amazingly useful Let’s Encrypt is, and gave them one too. It’s just a really good time to be in this hobby.

I highly recommend Certbot. If you’ve been putting this off, or only just hearing about it, make some time for it.

4 points

Downloading certificates from your domain provider is often a security problem. Only you are supposed to know your private keys.

permalink
report
reply
31 points

You’re supposed to upload the CSR, not the key.

But yeah, if they do all the generation themselves, they also have the private key and could easily break into anything the cert is used for.

permalink
report
parent
reply
3 points

Good point. Although they are also hosting my DNS, so they can take the site over anytime they want anyway?

permalink
report
parent
reply
8 points

They could hijack your site at any time, but with a copy of your live private certs they (or more likely whatever third party that will invariably breach your domain provider) can decrypt your otherwise secure traffic.

I don’t think there’s significant real tangible risk since who cares about your private selfhosted services and I’d be more worried about the domain being hijacked, and really any sort of network breach is probably interested in finding delicious credit card numbers and passwords and crypto private keys to munch on. If someone got into my network, spying on my Jellyfin streaming isn’t what I’m going to be worried about.

But it is why CSRs are used.

permalink
report
parent
reply
2 points

Thanks - I hadn’t considered the traffic decryption.

permalink
report
parent
reply
62 points
*
Deleted by creator
permalink
report
reply
23 points

Or traefik

permalink
report
parent
reply
9 points

traefik worked for me once. Then I tried to use it again in a different and I didn’t manage to get it to run. Caddy is much simpler. Traefik is more powerful but just for Let’s Encrypt I would go with Caddy.

permalink
report
parent
reply
3 points

I took a look at Traefik once and the complexity scared me away. Caddy is my cup of tea with one simple config file.

permalink
report
parent
reply
0 points

@clb92 @Appoxo …but traefik’s autoconfigure from labels on your services in the compose file is so nice.

permalink
report
parent
reply
3 points

Or swag ;)

permalink
report
parent
reply
2 points

Or Nginx Proxy Manager.

permalink
report
parent
reply
1 point

So many tools. Yet not enough time.

permalink
report
parent
reply
27 points

Certbot is great when using Nginx (or Apache2), but if you can use a different engine. Its worthwhile checking out Caddy!

permalink
report
reply
8 points

Wait until you hear about mod_md

permalink
report
reply
14 points

Wait till you guys use cert-manager on a kubernetes cluster

permalink
report
parent
reply
14 points

Wait until you stand up your own CA and issue certs with multi-year validity so they don’t have to be renewed more often than you rebuild everything anyway

At least until you try to access stuff on a Pixel phone which doesn’t let you install CA certs any more 😞

permalink
report
parent
reply
1 point

That’s a lot of work just to avoid a renewal process that’s fully automated. Seems counter productive.

permalink
report
parent
reply
16 points

Having certificates that are valid for over a year is contra-productive, as when they get in to the wrong hands they might still be valid for a year until they naturally run out of time. The reason LetsEncrypt issues only 90d valid certificates is not to annoy you, but save your ass once someone obtains your certificates.

permalink
report
parent
reply
2 points
*

I had no problem to install my CA on my Pixel (Android 13). I read that this was not possible for some time but Google changed it.

permalink
report
parent
reply
5 points

Wait until you set up cert-manager to issue both Let’s Encrypt certificates, as well as generating your own CA and issuing certs from your own CA where you can set the validity however want.

permalink
report
parent
reply
1 point

Pixel phone which doesn’t let you install CA certs any more

Is that something new? I can still install CA certs on my Pixel 6. It does give a scary warning, but you can just click through it.

permalink
report
parent
reply
1 point

Is it possible to change the elliptic curve yet or does it still throw suspicious errors

permalink
report
reply

Selfhosted

!selfhosted@lemmy.world

Create post

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don’t control.

Rules:

  1. Be civil: we’re here to support and learn from one another. Insults won’t be tolerated. Flame wars are frowned upon.

  2. No spam posting.

  3. Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it’s not obvious why your post topic revolves around selfhosting, please include details to make it clear.

  4. Don’t duplicate the full text of your blog or github here. Just post the link for folks to click.

  5. Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).

  6. No trolling.

Resources:

Any issues on the community? Report it using the report flag.

Questions? DM the mods!

Community stats

  • 4.7K

    Monthly active users

  • 3.5K

    Posts

  • 78K

    Comments