Stories
Slash Boxes
Comments

SoylentNews is people

posted by martyb on Thursday March 14 2019, @02:30PM   Printer-friendly
from the certs-are-not-just-a-breath-mint dept.

With many thanks to The Mighty Buzzard riding shotgun and helping me through some misunderstandings, I updated the certificates (certs) for all of SoylentNews' domains. Our certs are now good through: Wednesday, June 12, 2019.

Everything seemed to go as expected. If you experience any issues, please mention them here, or pop onto our IRC channel using your favorite client or the web interface and speak up in the #dev or #Soylent channel.


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 5, Informative) by martyb on Thursday March 14 2019, @04:44PM (11 children)

    by martyb (76) Subscriber Badge on Thursday March 14 2019, @04:44PM (#814294) Journal

    1) Your monitoring infrastructure should be testing all your certs anyway, so any that are due for renewal get flagged up as warnings, and that are invalidly deployed or expired get flagged up as criticals
    2) You should be automating this -- at the very least have a process that generates the correct number and contents of CSRs in the right format to send to your certificate authority, even if it doesn't automatically renew them
    3) you should be planning on reducing your certs from 2 years, not just for security reasons (and that's good enough anyway), but because CAB are likely going to be pushing it down to 1 year relatively soon anyway.

    Last things, first... our new certs (from Let's Encrypt) are set to expire on: Wednesday, June 12, 2019. So we are already at renewing every 3 months They kindly send out an email giving us a few weeks' advance notice of expiring certs.

    Next, there is some automation in place, but with checks along the way for manual confirmation before advancing to the next step.

    As for the other points, waaay back when, someone stood up an instance of Icinga [icinga.com]. They left, things changed, and it was not maintained. Eventually it was shut down. (Spoken only as an observer; I had nothing to do with the rollout or shutdown.)

    My focus/skill lies more on the upper layers of the software stack. Not so much with the setting up and running of the underlying services on which SoylentNews depends (Bind, Apache, MySql, Nginx, Perl, email, IRC, etc.) Further, we have a mix of OS platforms. Last I checked, we have one Centos, one OpenVZ (our backup server -- IIRC, it's an entirely different provider), a couple on gentoo, and the rest on Ubuntu LTS.

    Have you any experience with a mixed environment and can make a recommendation (preferably one that is light weight in resource needs)?

    Even better, would you like to volunteer? =)

    --
    Wit is intellect, dancing.
    Starting Score:    1  point
    Moderation   +3  
       Informative=2, Touché=1, Total=3
    Extra 'Informative' Modifier   0  
    Karma-Bonus Modifier   +1  

    Total Score:   5  
  • (Score: 2) by NewNic on Thursday March 14 2019, @05:38PM

    by NewNic (6420) on Thursday March 14 2019, @05:38PM (#814333) Journal

    Have you any experience with a mixed environment and can make a recommendation (preferably one that is light weight in resource needs)?

    My recommendation is to get rid of the mixed environment.

    Pick a distro that is supported long term and use only that. Multiple distros provide needless complications.

    --
    lib·er·tar·i·an·ism ˌlibərˈterēənizəm/ noun: Magical thinking that useful idiots mistake for serious political theory
  • (Score: 3, Informative) by NewNic on Thursday March 14 2019, @05:40PM (9 children)

    by NewNic (6420) on Thursday March 14 2019, @05:40PM (#814335) Journal

    Next, there is some automation in place, but with checks along the way for manual confirmation before advancing to the next step.

    And how well is that working out for you?

    If you fully automate it, you will have to fully fix any issues in the process.

    --
    lib·er·tar·i·an·ism ˌlibərˈterēənizəm/ noun: Magical thinking that useful idiots mistake for serious political theory
    • (Score: 4, Informative) by The Mighty Buzzard on Thursday March 14 2019, @05:56PM (4 children)

      by The Mighty Buzzard (18) Subscriber Badge <themightybuzzard@proton.me> on Thursday March 14 2019, @05:56PM (#814343) Homepage Journal

      I decided against automating changes to DNS for dns-01 challenges from LetsEncrypt. I prefer to make the whole domain utterly unreachable manually.

      --
      My rights don't end where your fear begins.
      • (Score: 2) by NewNic on Thursday March 14 2019, @08:27PM (3 children)

        by NewNic (6420) on Thursday March 14 2019, @08:27PM (#814430) Journal

        Why not use http challenges instead?

        --
        lib·er·tar·i·an·ism ˌlibərˈterēənizəm/ noun: Magical thinking that useful idiots mistake for serious political theory
        • (Score: 3, Informative) by The Mighty Buzzard on Thursday March 14 2019, @09:33PM (2 children)

          by The Mighty Buzzard (18) Subscriber Badge <themightybuzzard@proton.me> on Thursday March 14 2019, @09:33PM (#814493) Homepage Journal

          You can't on wildcard certs.

          --
          My rights don't end where your fear begins.
          • (Score: 2) by NewNic on Thursday March 14 2019, @09:42PM (1 child)

            by NewNic (6420) on Thursday March 14 2019, @09:42PM (#814501) Journal

            So don't use wildcards. Let's encrypt makes it very easy to use certs with multiple names in them.

            --
            lib·er·tar·i·an·ism ˌlibərˈterēənizəm/ noun: Magical thinking that useful idiots mistake for serious political theory
    • (Score: 3, Informative) by isostatic on Thursday March 14 2019, @08:32PM (3 children)

      by isostatic (365) on Thursday March 14 2019, @08:32PM (#814433) Journal

      Looks like they moved to wildcard certs for

      DNS Name: *.soylentnews.org
      DNS Name: *.sylnt.us
      DNS Name: soylentnews.org
      DNS Name: sylnt.us

      last July.

      However before then there were 17 certs with lets encrypt
      chat.soylentnews.org
      chat.sylnt.us
      dev.soylentnews.org
      irc1.sylnt.us
      irc2.sylnt.us
      irc-logs.soylentnews.org
      irc.soylentnews.org
      irc-stats.soylentnews.org
      irc.sylnt.us
      lists.soylentnews.org
      logs.sylnt.us
      mail.soylentnews.org
      postfixadmin.soylentnews.org
      stats.sylnt.us
      vm.soylentnews.org
      webmail.soylentnews.org
      wiki.soylentnews.org

      There was also a cert for www.soylentnews.org with Gandi, but that expired last june. Go back to 2015 and there was also "chillax.soylentnews.org", which had a Startcom cert (I think they were free -- they were/are a Chinese CA that got into some wrongdoing a couple of years ago)

      All of those appear to host pages on port 80, so I'm interested in the reason to not use /.well-known/acme-challange authentication, with a weekly renewal cronjob running. Avoid spreading a wildcard cert/key so far and wide, and have nothing manual to do.

      • (Score: 2) by NewNic on Thursday March 14 2019, @08:52PM

        by NewNic (6420) on Thursday March 14 2019, @08:52PM (#814451) Journal

        Exactly.

        It's very easy to have multiple names in a certificate with Let's encrypt.

        --
        lib·er·tar·i·an·ism ˌlibərˈterēənizəm/ noun: Magical thinking that useful idiots mistake for serious political theory
      • (Score: 2) by The Mighty Buzzard on Thursday March 14 2019, @09:34PM (1 child)

        by The Mighty Buzzard (18) Subscriber Badge <themightybuzzard@proton.me> on Thursday March 14 2019, @09:34PM (#814495) Homepage Journal

        You can't use http challenges for wildcard certs, must be dns-01.

        --
        My rights don't end where your fear begins.
        • (Score: 2) by isostatic on Friday March 15 2019, @04:35PM

          by isostatic (365) on Friday March 15 2019, @04:35PM (#814862) Journal

          Which goes back to the question of why use a wildcard cert