Stories
Slash Boxes
Comments

SoylentNews is people

SoylentNews is powered by your submissions, so send in your scoop. Only 18 submissions in the queue.
posted by martyb on Thursday March 14 2019, @02:30PM   Printer-friendly
from the certs-are-not-just-a-breath-mint dept.

With many thanks to The Mighty Buzzard riding shotgun and helping me through some misunderstandings, I updated the certificates (certs) for all of SoylentNews' domains. Our certs are now good through: Wednesday, June 12, 2019.

Everything seemed to go as expected. If you experience any issues, please mention them here, or pop onto our IRC channel using your favorite client or the web interface and speak up in the #dev or #Soylent channel.


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 5, Insightful) by Snow on Thursday March 14 2019, @02:52PM (40 children)

    by Snow (1601) on Thursday March 14 2019, @02:52PM (#814229) Journal

    Thank you for your hard work on keeping this site great.

    Starting Score:    1  point
    Moderation   +3  
       Insightful=3, Total=3
    Extra 'Insightful' Modifier   0  
    Karma-Bonus Modifier   +1  

    Total Score:   5  
  • (Score: 4, Interesting) by martyb on Thursday March 14 2019, @03:01PM (38 children)

    by martyb (76) Subscriber Badge on Thursday March 14 2019, @03:01PM (#814236) Journal

    Thank you for your hard work on keeping this site great.

    Looking back on things, I could have borked up everything so badly that all of our servers became inaccessible.

    TheMightyBuzzard had written up the steps to follow, but I have a "gift" for finding surprises. I made a couple mistakes along the way, but apparently that is par for the course. TMB had me back on course in short order. I've logged all my commands and output, so the next time should [hopefully] go more smoothly.

    And thanks for the support. It sometimes feels like a thankless task to keep the stories coming, but a little bit of appreciation goes a long ways!

    --
    Wit is intellect, dancing.
    • (Score: 4, Interesting) by Snow on Thursday March 14 2019, @03:09PM (24 children)

      by Snow (1601) on Thursday March 14 2019, @03:09PM (#814240) Journal

      Don't worry about making mistakes... as long as you fix them :)

      At my work, we have to reissue and assign certificates every 2 years. EVERY. SINGLE. TIME. it gets fucked up in some way. Usually by forgetting to assign the certificate to the service or not properly setting the permissions on the certificate. We find and fix the issue, then forget about it until we relearn everything again in two years.

      We have an IT team of 30+ people.

      • (Score: 2) by martyb on Thursday March 14 2019, @03:17PM (3 children)

        by martyb (76) Subscriber Badge on Thursday March 14 2019, @03:17PM (#814245) Journal

        Don't worry about making mistakes... as long as you fix them :)

        That's the main reason why I posted this story: if anything got borked, best to find out as soon as possible so we can fix it.

        --
        Wit is intellect, dancing.
        • (Score: 3, Interesting) by Runaway1956 on Thursday March 14 2019, @03:21PM (2 children)

          by Runaway1956 (2926) Subscriber Badge on Thursday March 14 2019, @03:21PM (#814249) Journal

          I logged in a few minutes ago from a LiveUSB. The Firefox version on the USB balked at the cert, but I just told it to accept permanently. Been fighting network problems, didn't need an additional problem. I probably should have written it down, with a time stamp though.

          • (Score: 3, Informative) by NewNic on Thursday March 14 2019, @05:35PM

            by NewNic (6420) on Thursday March 14 2019, @05:35PM (#814331) Journal

            Cert looks good under Firefox for me (Firefox 60.1.0esr under Linux).

            --
            lib·er·tar·i·an·ism ˌlibərˈterēənizəm/ noun: Magical thinking that useful idiots mistake for serious political theory
          • (Score: 2) by The Mighty Buzzard on Thursday March 14 2019, @05:52PM

            by The Mighty Buzzard (18) Subscriber Badge <themightybuzzard@proton.me> on Thursday March 14 2019, @05:52PM (#814340) Homepage Journal

            How old is the image? FF has had LetsEncrypt's CA trusted for a while now.

            --
            My rights don't end where your fear begins.
      • (Score: 4, Interesting) by isostatic on Thursday March 14 2019, @04:05PM (12 children)

        by isostatic (365) on Thursday March 14 2019, @04:05PM (#814271) Journal

        1) Your monitoring infrastructure should be testing all your certs anyway, so any that are due for renewal get flagged up as warnings, and that are invalidly deployed or expired get flagged up as criticals
        2) You should be automating this -- at the very least have a process that generates the correct number and contents of CSRs in the right format to send to your certificate authority, even if it doesn't automatically renew them
        3) you should be planning on reducing your certs from 2 years, not just for security reasons (and that's good enough anyway), but because CAB are likely going to be pushing it down to 1 year relatively soon anyway.

        • (Score: 5, Informative) by martyb on Thursday March 14 2019, @04:44PM (11 children)

          by martyb (76) Subscriber Badge on Thursday March 14 2019, @04:44PM (#814294) Journal

          1) Your monitoring infrastructure should be testing all your certs anyway, so any that are due for renewal get flagged up as warnings, and that are invalidly deployed or expired get flagged up as criticals
          2) You should be automating this -- at the very least have a process that generates the correct number and contents of CSRs in the right format to send to your certificate authority, even if it doesn't automatically renew them
          3) you should be planning on reducing your certs from 2 years, not just for security reasons (and that's good enough anyway), but because CAB are likely going to be pushing it down to 1 year relatively soon anyway.

          Last things, first... our new certs (from Let's Encrypt) are set to expire on: Wednesday, June 12, 2019. So we are already at renewing every 3 months They kindly send out an email giving us a few weeks' advance notice of expiring certs.

          Next, there is some automation in place, but with checks along the way for manual confirmation before advancing to the next step.

          As for the other points, waaay back when, someone stood up an instance of Icinga [icinga.com]. They left, things changed, and it was not maintained. Eventually it was shut down. (Spoken only as an observer; I had nothing to do with the rollout or shutdown.)

          My focus/skill lies more on the upper layers of the software stack. Not so much with the setting up and running of the underlying services on which SoylentNews depends (Bind, Apache, MySql, Nginx, Perl, email, IRC, etc.) Further, we have a mix of OS platforms. Last I checked, we have one Centos, one OpenVZ (our backup server -- IIRC, it's an entirely different provider), a couple on gentoo, and the rest on Ubuntu LTS.

          Have you any experience with a mixed environment and can make a recommendation (preferably one that is light weight in resource needs)?

          Even better, would you like to volunteer? =)

          --
          Wit is intellect, dancing.
          • (Score: 2) by NewNic on Thursday March 14 2019, @05:38PM

            by NewNic (6420) on Thursday March 14 2019, @05:38PM (#814333) Journal

            Have you any experience with a mixed environment and can make a recommendation (preferably one that is light weight in resource needs)?

            My recommendation is to get rid of the mixed environment.

            Pick a distro that is supported long term and use only that. Multiple distros provide needless complications.

            --
            lib·er·tar·i·an·ism ˌlibərˈterēənizəm/ noun: Magical thinking that useful idiots mistake for serious political theory
          • (Score: 3, Informative) by NewNic on Thursday March 14 2019, @05:40PM (9 children)

            by NewNic (6420) on Thursday March 14 2019, @05:40PM (#814335) Journal

            Next, there is some automation in place, but with checks along the way for manual confirmation before advancing to the next step.

            And how well is that working out for you?

            If you fully automate it, you will have to fully fix any issues in the process.

            --
            lib·er·tar·i·an·ism ˌlibərˈterēənizəm/ noun: Magical thinking that useful idiots mistake for serious political theory
            • (Score: 4, Informative) by The Mighty Buzzard on Thursday March 14 2019, @05:56PM (4 children)

              by The Mighty Buzzard (18) Subscriber Badge <themightybuzzard@proton.me> on Thursday March 14 2019, @05:56PM (#814343) Homepage Journal

              I decided against automating changes to DNS for dns-01 challenges from LetsEncrypt. I prefer to make the whole domain utterly unreachable manually.

              --
              My rights don't end where your fear begins.
              • (Score: 2) by NewNic on Thursday March 14 2019, @08:27PM (3 children)

                by NewNic (6420) on Thursday March 14 2019, @08:27PM (#814430) Journal

                Why not use http challenges instead?

                --
                lib·er·tar·i·an·ism ˌlibərˈterēənizəm/ noun: Magical thinking that useful idiots mistake for serious political theory
                • (Score: 3, Informative) by The Mighty Buzzard on Thursday March 14 2019, @09:33PM (2 children)

                  by The Mighty Buzzard (18) Subscriber Badge <themightybuzzard@proton.me> on Thursday March 14 2019, @09:33PM (#814493) Homepage Journal

                  You can't on wildcard certs.

                  --
                  My rights don't end where your fear begins.
                  • (Score: 2) by NewNic on Thursday March 14 2019, @09:42PM (1 child)

                    by NewNic (6420) on Thursday March 14 2019, @09:42PM (#814501) Journal

                    So don't use wildcards. Let's encrypt makes it very easy to use certs with multiple names in them.

                    --
                    lib·er·tar·i·an·ism ˌlibərˈterēənizəm/ noun: Magical thinking that useful idiots mistake for serious political theory
            • (Score: 3, Informative) by isostatic on Thursday March 14 2019, @08:32PM (3 children)

              by isostatic (365) on Thursday March 14 2019, @08:32PM (#814433) Journal

              Looks like they moved to wildcard certs for

              DNS Name: *.soylentnews.org
              DNS Name: *.sylnt.us
              DNS Name: soylentnews.org
              DNS Name: sylnt.us

              last July.

              However before then there were 17 certs with lets encrypt
              chat.soylentnews.org
              chat.sylnt.us
              dev.soylentnews.org
              irc1.sylnt.us
              irc2.sylnt.us
              irc-logs.soylentnews.org
              irc.soylentnews.org
              irc-stats.soylentnews.org
              irc.sylnt.us
              lists.soylentnews.org
              logs.sylnt.us
              mail.soylentnews.org
              postfixadmin.soylentnews.org
              stats.sylnt.us
              vm.soylentnews.org
              webmail.soylentnews.org
              wiki.soylentnews.org

              There was also a cert for www.soylentnews.org with Gandi, but that expired last june. Go back to 2015 and there was also "chillax.soylentnews.org", which had a Startcom cert (I think they were free -- they were/are a Chinese CA that got into some wrongdoing a couple of years ago)

              All of those appear to host pages on port 80, so I'm interested in the reason to not use /.well-known/acme-challange authentication, with a weekly renewal cronjob running. Avoid spreading a wildcard cert/key so far and wide, and have nothing manual to do.

              • (Score: 2) by NewNic on Thursday March 14 2019, @08:52PM

                by NewNic (6420) on Thursday March 14 2019, @08:52PM (#814451) Journal

                Exactly.

                It's very easy to have multiple names in a certificate with Let's encrypt.

                --
                lib·er·tar·i·an·ism ˌlibərˈterēənizəm/ noun: Magical thinking that useful idiots mistake for serious political theory
              • (Score: 2) by The Mighty Buzzard on Thursday March 14 2019, @09:34PM (1 child)

                by The Mighty Buzzard (18) Subscriber Badge <themightybuzzard@proton.me> on Thursday March 14 2019, @09:34PM (#814495) Homepage Journal

                You can't use http challenges for wildcard certs, must be dns-01.

                --
                My rights don't end where your fear begins.
                • (Score: 2) by isostatic on Friday March 15 2019, @04:35PM

                  by isostatic (365) on Friday March 15 2019, @04:35PM (#814862) Journal

                  Which goes back to the question of why use a wildcard cert

      • (Score: 1) by shrewdsheep on Thursday March 14 2019, @04:24PM (6 children)

        by shrewdsheep (5215) on Thursday March 14 2019, @04:24PM (#814280)

        Put it into your configuration management system right after getting it to work. It is tempting to forget about it because the next task is waiting. However, tt will safe you time, even if you waste some time on configurations that you might not need later (been there several times).

        • (Score: 2) by Snow on Thursday March 14 2019, @04:35PM (3 children)

          by Snow (1601) on Thursday March 14 2019, @04:35PM (#814284) Journal

          HAHA, that's funny.

          Configuration Management System... Good one! I'll enter that as a suggestion in the Problem Management system and bring it up at the next CAB meeting, LOL!

          Seriously though, all our documentation is scattered all over the place in a disaster of an implementation of Sharepoint. It's definitely a factor in screwing up certs every time. Sharepoint is so shitty that no one wants to use it, so they just wing it every time.

          • (Score: 0) by Anonymous Coward on Thursday March 14 2019, @07:37PM (1 child)

            by Anonymous Coward on Thursday March 14 2019, @07:37PM (#814397)

            Sharepoint? You poor bastards.

            • (Score: 0) by Anonymous Coward on Friday March 15 2019, @12:39PM

              by Anonymous Coward on Friday March 15 2019, @12:39PM (#814729)

              Shitpoint

          • (Score: 0) by Anonymous Coward on Friday March 15 2019, @02:55AM

            by Anonymous Coward on Friday March 15 2019, @02:55AM (#814614)

            DHS?

        • (Score: 2) by The Mighty Buzzard on Thursday March 14 2019, @06:05PM (1 child)

          by The Mighty Buzzard (18) Subscriber Badge <themightybuzzard@proton.me> on Thursday March 14 2019, @06:05PM (#814346) Homepage Journal

          Our configuration management system is a multi-process system. Different bits run in each of the admins' brains. Except for the bits that were set up by admins who've wandered on to greener pastures. We just wait until something breaks to monkey with those.

          --
          My rights don't end where your fear begins.
          • (Score: 2) by driverless on Friday March 15 2019, @04:53AM

            by driverless (4770) on Friday March 15 2019, @04:53AM (#814668)

            Our configuration management system is Paul. "Hey Paul, what's the latest on X?". Occasionally we have to reinstall beer in Paul, particularly on Friday afternoons, but apart from that it works OK.

    • (Score: 2) by NotSanguine on Thursday March 14 2019, @04:36PM (11 children)

      Thank you for your hard work on keeping this site great.

      Looking back on things, I could have borked up everything so badly that all of our servers became inaccessible.

      TheMightyBuzzard had written up the steps to follow, but I have a "gift" for finding surprises. I made a couple mistakes along the way, but apparently that is par for the course. TMB had me back on course in short order. I've logged all my commands and output, so the next time should [hopefully] go more smoothly.

      And thanks for the support. It sometimes feels like a thankless task to keep the stories coming, but a little bit of appreciation goes a long ways!

      Yes. Your hard work makes this place go. I know I appreciate it. Thanks to you and all the volunteers!

      As an aside, I'm curious why it was complicated. I just updated several Let's Encrypt certs on one of my servers and installed a new Let's Encrypt cert on a new server a few hours ago. Using Certbot [gentoo.org] it took less than 30 seconds to renew three certs (via 'certbot renew') and almost ten minutes (as I had to use 'certbot certonly' and then modify my http server config and restart) for the new server.

      I'm not poking you or Buzzard, I'm genuinely curious as to what's more complicated, aside from having to replicate the certs to multiple servers.

      In fact, when renewing my certs I chastised myself for not just automating the process.

      Perhaps a cron job that runs every 6-8 weeks like this:
      #!/bin/sh
      #
      # Renew certs
      /usr/bin/certbot renew
      for i in host1 host2 ... hostn
      /usr/bin/scp [path to renewed cert] ${i}:[path to cert]

      Or something similar. I'm probably missing some complexity in the SN environment, but like I said I'm curious.

      --
      No, no, you're not thinking; you're just being logical. --Niels Bohr
      • (Score: 2) by martyb on Thursday March 14 2019, @05:04PM (2 children)

        by martyb (76) Subscriber Badge on Thursday March 14 2019, @05:04PM (#814300) Journal

        As this was my very first time ever updating certs, that just might have been a factor. I have a high-level concept of DNS and certs, but actually messing around with actual files and their syntax... let's just say I was very cautious.

        A long time ago I came upon some words of wisdom that have served me well:

        Strive to understand your problem;
          Do not try to solve it.
        A fully stated problem
          embodies its solution.

        I knew I did not understand, so I took my time as I went. Here's another:

        The longest distance between two points is a shortcut.

        Until it is absolutely clear what ALL the success -- and failure -- paths are, my experience has been that it is best to keep a human in the loop.

        For further details on possible additional automation I will have to defer to the others on staff who have way more experience with this than I do.

        --
        Wit is intellect, dancing.
        • (Score: 2) by NotSanguine on Thursday March 14 2019, @05:22PM

          Until it is absolutely clear what ALL the success -- and failure -- paths are, my experience has been that it is best to keep a human in the loop.

          For further details on possible additional automation I will have to defer to the others on staff who have way more experience with this than I do.

          As the wonderful G.B. Shaw said:

          The reasonable man adapts himself to the world: the unreasonable one persists in trying to adapt the world to himself. Therefore all progress depends on the unreasonable man.

          I try to be unreasonable. :)

          --
          No, no, you're not thinking; you're just being logical. --Niels Bohr
        • (Score: 0) by Anonymous Coward on Friday March 15 2019, @03:02AM

          by Anonymous Coward on Friday March 15 2019, @03:02AM (#814625)

          This demonstrates the attitude of a good sys admin.

          https://xkcd.com/705/ [xkcd.com]

      • (Score: 3, Informative) by The Mighty Buzzard on Thursday March 14 2019, @06:00PM (7 children)

        by The Mighty Buzzard (18) Subscriber Badge <themightybuzzard@proton.me> on Thursday March 14 2019, @06:00PM (#814344) Homepage Journal

        dns-01 challenges are required for wildcard certs. I don't want to automate DNS changes, I prefer to screw those up on my own. Otherwise it would be a "run this script and go back to what you were doing" thing.

        --
        My rights don't end where your fear begins.
        • (Score: 2) by NotSanguine on Thursday March 14 2019, @06:35PM

          dns-01 challenges are required for wildcard certs. I don't want to automate DNS changes

          That's sensible. I'm not a huge fan of wildcard certs, but I can see how they'd be quite useful in the SN environment.

          --
          No, no, you're not thinking; you're just being logical. --Niels Bohr
        • (Score: 2) by NewNic on Thursday March 14 2019, @08:30PM (5 children)

          by NewNic (6420) on Thursday March 14 2019, @08:30PM (#814432) Journal

          Don't use wildcards.

          --
          lib·er·tar·i·an·ism ˌlibərˈterēənizəm/ noun: Magical thinking that useful idiots mistake for serious political theory
          • (Score: 2) by The Mighty Buzzard on Thursday March 14 2019, @09:41PM (4 children)

            by The Mighty Buzzard (18) Subscriber Badge <themightybuzzard@proton.me> on Thursday March 14 2019, @09:41PM (#814499) Homepage Journal

            We have many different things serving up http pages for all the hostnames we have on many different boxes. And we have hostnames that don't have web content associated with them at all. It was always a much bigger pain in the ass managing the multi-name certs than having to manually update four values in DNS every few months.

            --
            My rights don't end where your fear begins.
            • (Score: 2) by NewNic on Thursday March 14 2019, @09:55PM (3 children)

              by NewNic (6420) on Thursday March 14 2019, @09:55PM (#814507) Journal

              It was always a much bigger pain in the ass managing the multi-name certs than having to manually update four values in DNS every few months.

              For a traditional certificate issuance, I can see that. With Let's Encrypt, it is trivial to manage multi-name certs. For those machines without a web server, you can use the Standalone plugin, which starts its own web server.

              Oh well, if you want to persist with an error-prone and time wasting process, who am I to argue with you.

              --
              lib·er·tar·i·an·ism ˌlibərˈterēənizəm/ noun: Magical thinking that useful idiots mistake for serious political theory
              • (Score: 2) by The Mighty Buzzard on Friday March 15 2019, @12:38AM (2 children)

                You're not understanding how much of a mess our setup is. If you put all the hostnames that just beryllium uses in one cert, you have to make more than one webserver with many different vhosts on them serve the right response for each and every vhost (certbot trying to do this automatically breaks half the vhosts), then you have to make the multiple irc hostnames serve up the proper response, then you have to make the mail server hostnames serve up the right response. And when you want to add or remove a hostname from use on the box, you have to redo the cert from scratch.

                Seriously, it's much quicker and easier to use a wildcard cert. I've never had a multihost SN cert take less than an hour worth of work to renew.

                --
                My rights don't end where your fear begins.
                • (Score: 2) by NewNic on Friday March 15 2019, @06:53PM (1 child)

                  by NewNic (6420) on Friday March 15 2019, @06:53PM (#814956) Journal

                  If you put all the hostnames that just beryllium uses in one cert, you have to make more than one webserver with many different vhosts

                  No, you exclude the "/.well-known" location from the Vhosts. This can be achieved with an alias command.
                  https://community.letsencrypt.org/t/apache-multidomain-webroot/10663 [letsencrypt.org]

                  --
                  lib·er·tar·i·an·ism ˌlibərˈterēənizəm/ noun: Magical thinking that useful idiots mistake for serious political theory
                  • (Score: 2) by The Mighty Buzzard on Saturday March 16 2019, @12:43AM

                    by The Mighty Buzzard (18) Subscriber Badge <themightybuzzard@proton.me> on Saturday March 16 2019, @12:43AM (#815184) Homepage Journal

                    Or I could do like I'm doing and never have to touch the configs of anything but the one we pull the cert from. And never have to remake the entire enormous cert, hoping I don't miss a hostname but knowing I will, if Deucalion thinks we need a new IRC hostname on one of the existing boxes.

                    --
                    My rights don't end where your fear begins.
    • (Score: 0) by Anonymous Coward on Thursday March 14 2019, @05:11PM

      by Anonymous Coward on Thursday March 14 2019, @05:11PM (#814306)

      I hope you also updated the documentation with the caveats you bumped into. :)

      All things are simple when you know how to do them.

  • (Score: 2) by driverless on Friday March 15 2019, @03:49AM

    by driverless (4770) on Friday March 15 2019, @03:49AM (#814651)

    Thank you for your hard work on keeping this site great.

    Helping to MthissiteGA?