I hate linux. I hate SSL more.
-
I have 3000+ domains on IISs behind multiple HAProxyeis and NGinxs. One Windows VM is responsible for the creations and renewal of all certs on all Proxies using custom C#. (Keeps the date of last renew, renews, saves on proxy via SFTP, reloads proxy via SSH) A certificate is renewed every 60 days, if it fails i get warned and have 30 days to solve the problem. It never fails on LetsEncrypt, it is always because the Domain DNSs are wrong or something like that. Commercial/Adminstrative people add or remove clients (domains) at will and i never have to handle any of that. I absolutely love LetsEncrypt. No way i would renew 3000 domains manually. Tip: Don't stop NGinx, just reload it. (i assume certbot will not complain) If something fails on the renew, the site is still up with the old cert.
certbot won't run if something is bound to the http ports
To err is human. Fortune favors the monsters.
-
certbot won't run if something is bound to the http ports
To err is human. Fortune favors the monsters.
Ahh. OK. I have only one certbot in a Raspberry PI at home but is running as a service/daemon. I do not remember what i done, but it keeps renewing the cert by it self. Nothing gets added or removed from that PI, so it not a good comparison. But i find strange (a lot) that webserver has to stop to renew the cert. Renewing many sites takes a lot of time and no way the downtime is acceptable. Don't know what it is, but something is up.
-
Ahh. OK. I have only one certbot in a Raspberry PI at home but is running as a service/daemon. I do not remember what i done, but it keeps renewing the cert by it self. Nothing gets added or removed from that PI, so it not a good comparison. But i find strange (a lot) that webserver has to stop to renew the cert. Renewing many sites takes a lot of time and no way the downtime is acceptable. Don't know what it is, but something is up.
Yeah probably ugly, although most larger sites are load balanced so in theory it should be possible to update a node at a time without downtime for a site like that. But I share your confusion as to why the site needs to be stopped.
To err is human. Fortune favors the monsters.
-
So certs are the badge of a secure website and the right to claim "https". That relationship is not obvious. Thanx.
"A little time, a little trouble, your better day" Badfinger
A bit more than that. The https protocol is not just a "label", it's an actual protocol, and the handshaking involves the sharing of the certificate with the requester. So the cert is an integral part of the SSL protocol. No cert, HTTPS doesn't even begin to work.
Telegraph marker posts ... nothing to do with IT Phasmid email discussion group ... also nothing to do with IT Beekeeping and honey site ... still nothing to do with IT
-
your browser will default to https these days. sites pretty much have to support SSL.
To err is human. Fortune favors the monsters.
-
Not sure which browser you're using but Edge, Chrome (unless it was in the update this week), and Firefox don't default to SSL. They do check for a certificate first and then warn you if you're going to an https URL and there's no certificate.
the heck it doesn't. It wants to do it unless i explicitly type http:// in the address bar. I always have to fiddle with that when i'm calling web stuff off an esp32 which doesn't do ssl
To err is human. Fortune favors the monsters.
-
trying to renew my cert should have taken 3 lines
sudo systemctl stop nginx
sudo certbot renew
sudo systemctl start nginxInstead, the thing refused to stop and took over an hour to troubleshoot. And this is basically par for the course with these systems. Particularly linux distros. I'm so over it. I want to like open source, but sometimes it seems rickety. Also, why the heck do we need to encrypt all web traffic these days? Certs are a hassle I'd rather not have to deal with ever 90 days. Sorry guys. Just venting over here. Maybe some of you know why waving a dead chicken over linux never works, but I don't.
To err is human. Fortune favors the monsters.
I've ad better luck with rubber chickens. :laugh:
-
trying to renew my cert should have taken 3 lines
sudo systemctl stop nginx
sudo certbot renew
sudo systemctl start nginxInstead, the thing refused to stop and took over an hour to troubleshoot. And this is basically par for the course with these systems. Particularly linux distros. I'm so over it. I want to like open source, but sometimes it seems rickety. Also, why the heck do we need to encrypt all web traffic these days? Certs are a hassle I'd rather not have to deal with ever 90 days. Sorry guys. Just venting over here. Maybe some of you know why waving a dead chicken over linux never works, but I don't.
To err is human. Fortune favors the monsters.
-
trying to renew my cert should have taken 3 lines
sudo systemctl stop nginx
sudo certbot renew
sudo systemctl start nginxInstead, the thing refused to stop and took over an hour to troubleshoot. And this is basically par for the course with these systems. Particularly linux distros. I'm so over it. I want to like open source, but sometimes it seems rickety. Also, why the heck do we need to encrypt all web traffic these days? Certs are a hassle I'd rather not have to deal with ever 90 days. Sorry guys. Just venting over here. Maybe some of you know why waving a dead chicken over linux never works, but I don't.
To err is human. Fortune favors the monsters.
to answer that question of WHY SSL. Because we need some privacy in what we are doing. Before SSL, every man in the middle knew every search, your passwords to FTP and your email passwords (no ENCODING is not encryption, LOL). So, now only GOOGLE (or your browser) can sell your URL hits if they are not tracked elsewhere (usually by google, fb, etc). This is a step in the right direction. I use apache, and the process (as mentioned elsewhere) is pretty clean. My chief tech automated it years ago, never noticed it. It just works. Thankfully. (Of course my published site is very touchy, you don't get a 404 error. You get firewall BLOCKED for 72hrs, got tired of robo attacks, lol. Oh, outside of the us, it could be a 30 day ban! (99% of my web traffic was simply attack bots checking for phpmysql, etc)). Spend the time to make sure you have the configuration right, and easier to update, it's clearly worth it. But we need SSL. EVERYTHING over the internet should use strong encryption. The fact that we SUCK at it... Is kinda on us... We spend very little time playing with it, and just want it to work.
-
trying to renew my cert should have taken 3 lines
sudo systemctl stop nginx
sudo certbot renew
sudo systemctl start nginxInstead, the thing refused to stop and took over an hour to troubleshoot. And this is basically par for the course with these systems. Particularly linux distros. I'm so over it. I want to like open source, but sometimes it seems rickety. Also, why the heck do we need to encrypt all web traffic these days? Certs are a hassle I'd rather not have to deal with ever 90 days. Sorry guys. Just venting over here. Maybe some of you know why waving a dead chicken over linux never works, but I don't.
To err is human. Fortune favors the monsters.
why do we need privecy? because years ago someone complained about someone walking around naked, they were chill with it, if you dont want to look thats on you. but nah, all the offended people got together and said, NO, privates should be covered by default we making some laws about it, then everyone like ok and followed along. Its more the 1 person that was taking pictures of other naked people in public, which if they didnt go and share it out with everone else, probably would have been an issue, but they did, and complaints were made. the real annoying part is when its your own local home and its still like no, you gotta go extra steps if want to be un clothed here. but I own this, I know this place, its okay. No your password for localhost appears on a leak list, imma be dumb and not filter out admin admin for localhost
-
trying to renew my cert should have taken 3 lines
sudo systemctl stop nginx
sudo certbot renew
sudo systemctl start nginxInstead, the thing refused to stop and took over an hour to troubleshoot. And this is basically par for the course with these systems. Particularly linux distros. I'm so over it. I want to like open source, but sometimes it seems rickety. Also, why the heck do we need to encrypt all web traffic these days? Certs are a hassle I'd rather not have to deal with ever 90 days. Sorry guys. Just venting over here. Maybe some of you know why waving a dead chicken over linux never works, but I don't.
To err is human. Fortune favors the monsters.
I'm annoyed by Linux for similar reasons. It's a lot of hacks on hacks, a lot of accepting the status quo as how things must be instead of taking a huge step back & re-evaluating whether the present behavior really is the best platform to build the future upon. However, do you really have to deal with it every 90 days yourself? Meaning, can't you schedule that stuff (assuming there's no more troubleshooting involved)?
-
I'm annoyed by Linux for similar reasons. It's a lot of hacks on hacks, a lot of accepting the status quo as how things must be instead of taking a huge step back & re-evaluating whether the present behavior really is the best platform to build the future upon. However, do you really have to deal with it every 90 days yourself? Meaning, can't you schedule that stuff (assuming there's no more troubleshooting involved)?
I can probably automate it now that it's fixed but I am concerned about the issues that I had to troubleshoot or similar cropping up again and maybe blowing up my site when I'm not around, so my other plan was to maybe have it send me mail just before I need to renew but I don't have qmail installed or anything like that. I have other issues currently that are making demands on my time so I haven't fiddled with it. I figure I have about 80 days to come up with something. :)
To err is human. Fortune favors the monsters.
-
trying to renew my cert should have taken 3 lines
sudo systemctl stop nginx
sudo certbot renew
sudo systemctl start nginxInstead, the thing refused to stop and took over an hour to troubleshoot. And this is basically par for the course with these systems. Particularly linux distros. I'm so over it. I want to like open source, but sometimes it seems rickety. Also, why the heck do we need to encrypt all web traffic these days? Certs are a hassle I'd rather not have to deal with ever 90 days. Sorry guys. Just venting over here. Maybe some of you know why waving a dead chicken over linux never works, but I don't.
To err is human. Fortune favors the monsters.
I had similar setup with certbot nginx and several services spanning 3 machines. There are some hickups from time to time but mostly it works. Surprisingly because it is not like I am linux admin.
No more Mister Nice Guy... >: |
-
honey the codewitch wrote:
Maybe some of you know why waving a dead chicken over linux never works, but I don't.
Windows is a proprietary O/S, so waving proprietary dead chickens over it works. Linux is an open-source O/S; you need to open-source your dead chickens. ;) :)
Freedom is the freedom to say that two plus two make four. If that is granted, all else follows. -- 6079 Smith W.
...also, which dead chicken you use is dependent on your distro. When in doubt, you may have to try all 500+ of them... but try them quickly. The longer you wait, the more seem to hatch! :-D
-
I can probably automate it now that it's fixed but I am concerned about the issues that I had to troubleshoot or similar cropping up again and maybe blowing up my site when I'm not around, so my other plan was to maybe have it send me mail just before I need to renew but I don't have qmail installed or anything like that. I have other issues currently that are making demands on my time so I haven't fiddled with it. I figure I have about 80 days to come up with something. :)
To err is human. Fortune favors the monsters.
I find your experience very weird. Especially since you think everything needs to be unbound from http port before you can use certbot. The whole *point* of certbot is that it checks to see if the machine it is running on is the machine that it can reach a http site at... Therefore, they know who it is that requested the certificate. FWIW, I have a bit of trouble with certbot because my default firewall configuration blocks http to internet, so I have to whitelist the port, run certbot, and unwhitelist every three months. Takes literally 5 seconds. I don't know what you're doing, but "it works on my machine"! BTW, please don't blame Linux for what is clearly a certbot problem. :) Remember, Linux is fragmented, so there are many many good softwares and designs that you use on Linux constantly without realizing, and only a few that are bad. It's not all one giant corporation putting out completely bad stuff.... or updating constantly to provide new icon sets.
-
I find your experience very weird. Especially since you think everything needs to be unbound from http port before you can use certbot. The whole *point* of certbot is that it checks to see if the machine it is running on is the machine that it can reach a http site at... Therefore, they know who it is that requested the certificate. FWIW, I have a bit of trouble with certbot because my default firewall configuration blocks http to internet, so I have to whitelist the port, run certbot, and unwhitelist every three months. Takes literally 5 seconds. I don't know what you're doing, but "it works on my machine"! BTW, please don't blame Linux for what is clearly a certbot problem. :) Remember, Linux is fragmented, so there are many many good softwares and designs that you use on Linux constantly without realizing, and only a few that are bad. It's not all one giant corporation putting out completely bad stuff.... or updating constantly to provide new icon sets.
i will blame linux for having to %$#*)@ around with systemd far more than i ever should have to fix the problem.
To err is human. Fortune favors the monsters.
-
to answer that question of WHY SSL. Because we need some privacy in what we are doing. Before SSL, every man in the middle knew every search, your passwords to FTP and your email passwords (no ENCODING is not encryption, LOL). So, now only GOOGLE (or your browser) can sell your URL hits if they are not tracked elsewhere (usually by google, fb, etc). This is a step in the right direction. I use apache, and the process (as mentioned elsewhere) is pretty clean. My chief tech automated it years ago, never noticed it. It just works. Thankfully. (Of course my published site is very touchy, you don't get a 404 error. You get firewall BLOCKED for 72hrs, got tired of robo attacks, lol. Oh, outside of the us, it could be a 30 day ban! (99% of my web traffic was simply attack bots checking for phpmysql, etc)). Spend the time to make sure you have the configuration right, and easier to update, it's clearly worth it. But we need SSL. EVERYTHING over the internet should use strong encryption. The fact that we SUCK at it... Is kinda on us... We spend very little time playing with it, and just want it to work.
Yeah, all of this. Although once traffic is "on the inside" I think people do tend to keep it SSL and this is probably a little bit bad/irrelevant/overkill. Encryption/decryption doesn't come for free. Let the API gateways/load balancers handle it. My mouth stood agape at a line in Microsoft docs recently for a specific kind of containerization on Azure where they say applications don't have to and should not implement SSL. I have to think their thinking is much like the sentiment above. However, it IS maybe a notably different animal to be able to sniff your own traffic.
-
Yeah, all of this. Although once traffic is "on the inside" I think people do tend to keep it SSL and this is probably a little bit bad/irrelevant/overkill. Encryption/decryption doesn't come for free. Let the API gateways/load balancers handle it. My mouth stood agape at a line in Microsoft docs recently for a specific kind of containerization on Azure where they say applications don't have to and should not implement SSL. I have to think their thinking is much like the sentiment above. However, it IS maybe a notably different animal to be able to sniff your own traffic.
Agreed, but remember that for DECADES our poor practices at protecting thing (Storing passwords clear text in DBs associated with the users, shoving them in COOKIES (OMG) as opposed to some GUID), and thinking we can ADD security later. You know, like we can ADD performance Later... (Every project I've seen with that attitude suffered massive performance issues. You DESIGN for performance, you implement with care. If speed is important, then it's part of the CONTRACT and TRACING). If Security is remotely important. It's got to be part of the contract. And in todays world. Let's ASSUME that a LACK of security is a NON-STARTER. The tools are getting easier/better. But people still not understanding which is the PRIVATE KEY and which is the PUBLIC KEY is getting old. (of course calling them both key files, and sometimes .key or no extension doesn't help, but the .pub should be pretty obvious). --> We've come a VERY LONG way since the 1940s (Pre-Fortran). C, C++ (Objects), (Frameworks), and more! I have hope!
-
trying to renew my cert should have taken 3 lines
sudo systemctl stop nginx
sudo certbot renew
sudo systemctl start nginxInstead, the thing refused to stop and took over an hour to troubleshoot. And this is basically par for the course with these systems. Particularly linux distros. I'm so over it. I want to like open source, but sometimes it seems rickety. Also, why the heck do we need to encrypt all web traffic these days? Certs are a hassle I'd rather not have to deal with ever 90 days. Sorry guys. Just venting over here. Maybe some of you know why waving a dead chicken over linux never works, but I don't.
To err is human. Fortune favors the monsters.
It is a principle in cryptography that only encrypting 'what is important' just tells adversaries what to focus on. It gives them valuable information that they would not otherwise have, and the last thing you want to give adversaries is any information. Cheers, Russ
-
trying to renew my cert should have taken 3 lines
sudo systemctl stop nginx
sudo certbot renew
sudo systemctl start nginxInstead, the thing refused to stop and took over an hour to troubleshoot. And this is basically par for the course with these systems. Particularly linux distros. I'm so over it. I want to like open source, but sometimes it seems rickety. Also, why the heck do we need to encrypt all web traffic these days? Certs are a hassle I'd rather not have to deal with ever 90 days. Sorry guys. Just venting over here. Maybe some of you know why waving a dead chicken over linux never works, but I don't.
To err is human. Fortune favors the monsters.
Agreed. Linux is a POS based on something which was cool in 1968. However, I don't have a beard down to my balls, and I don't wear sandals, so...