<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	
	xmlns:georss="http://www.georss.org/georss"
	xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
	>

<channel>
	<title>let&#039;s encrypt Archives - Pietari Heino&#039;s personal website</title>
	<atom:link href="https://www.extreg.com/blog/tag/lets-encrypt/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.extreg.com</link>
	<description></description>
	<lastBuildDate>Wed, 31 Aug 2016 19:41:34 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=5.6.7</generator>
<site xmlns="com-wordpress:feed-additions:1">99365322</site>	<item>
		<title>Be careful with the Let&#8217;s Encrypt&#8217;s deployment automation</title>
		<link>https://www.extreg.com/blog/2016/08/careful-lets-encrypts-deployment-automation/</link>
					<comments>https://www.extreg.com/blog/2016/08/careful-lets-encrypts-deployment-automation/#respond</comments>
		
		<dc:creator><![CDATA[Pietari]]></dc:creator>
		<pubDate>Wed, 31 Aug 2016 19:41:24 +0000</pubDate>
				<category><![CDATA[random]]></category>
		<category><![CDATA[certbot]]></category>
		<category><![CDATA[certificate]]></category>
		<category><![CDATA[eff]]></category>
		<category><![CDATA[let's encrypt]]></category>
		<guid isPermaLink="false">https://extreg.com/?p=81</guid>

					<description><![CDATA[<p>I just noticed an error that had gone unseen: this very site was serving another site&#8217;s HTTPS certificate. I started digging what had gone wrong and noticed that EFF&#8217;s Certbot had touched the Apache configurations of this site even though I deployed a cert for another site. It had overwritten the configuration and even added more lines to ... <span class="more"><a class="more-link" href="https://www.extreg.com/blog/2016/08/careful-lets-encrypts-deployment-automation/">[Read more...]</a></span></p>
<p>The post <a rel="nofollow" href="https://www.extreg.com/blog/2016/08/careful-lets-encrypts-deployment-automation/">Be careful with the Let&#8217;s Encrypt&#8217;s deployment automation</a> appeared first on <a rel="nofollow" href="https://www.extreg.com">Pietari Heino&#039;s personal website</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>I just noticed an error that had gone unseen: this very site was serving another site&#8217;s HTTPS certificate. I started digging what had gone wrong and noticed that EFF&#8217;s <a href="https://certbot.eff.org/">Certbot</a> had touched the Apache configurations of this site <strong><em>even though </em></strong>I deployed a cert for another site. It had overwritten the configuration and even added more lines to it.</p>
<p><strong>The devil is in the automation. </strong>I have used Certbot a couple of times with the CLI args (-d etc.) and with the GUI. I have used it completely successfully and without any problems, but that doesn&#8217;t matter here: I&#8217;m 100 % confident that I have not given permission in any GUI or CLI to amend the Apache configurations for this domain name when deploying a certificate for another domain (which was, btw, being served by NGINX). It has to have happened in the background, behind the curtain, you know, where the process is automated – which is also the key selling point of Let&#8217;s Encrypt and Certbot, to make it easy and automated.</p>
<p>This of course raises the question whether I&#8217;m to blame Certbot or did I do something wrong and actually the service was working as expected. Who knows. I also admit that my VPS setup consists not only of one domain and one IP address, but multiple domains served by both Apache and NGINX from three IP addresses. Nonetheless, I should be able to trust the automation. But the <strong>takeaway</strong> here, for me atleast, is to write a script to check whether the correct config files and none else were touched during the deployment. Certbot already prints out to you the list of issued certificates, their private keys, and certificate chains. It would be a nice improvement to have a list of <em><strong>all touched files </strong></em>during the deployment just to alert the geek.</p>
<p>The post <a rel="nofollow" href="https://www.extreg.com/blog/2016/08/careful-lets-encrypts-deployment-automation/">Be careful with the Let&#8217;s Encrypt&#8217;s deployment automation</a> appeared first on <a rel="nofollow" href="https://www.extreg.com">Pietari Heino&#039;s personal website</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.extreg.com/blog/2016/08/careful-lets-encrypts-deployment-automation/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">81</post-id>	</item>
		<item>
		<title>The problem with Let&#8217;s Encrypt (or someone&#8217;s)</title>
		<link>https://www.extreg.com/blog/2016/06/the-problem-with-lets-encrypt-or-someones/</link>
					<comments>https://www.extreg.com/blog/2016/06/the-problem-with-lets-encrypt-or-someones/#respond</comments>
		
		<dc:creator><![CDATA[Pietari]]></dc:creator>
		<pubDate>Tue, 21 Jun 2016 17:36:47 +0000</pubDate>
				<category><![CDATA[random]]></category>
		<category><![CDATA[https secure connection]]></category>
		<category><![CDATA[let's encrypt]]></category>
		<category><![CDATA[shared web hosting]]></category>
		<guid isPermaLink="false">https://extreg.com/?p=58</guid>

					<description><![CDATA[<p>Let&#8217;s Encrypt gives you free DV certificates via easy to use, automated process. Just install their script, or choose one from the gazillion of custom ones, and you&#8217;re good to go with a strong encryption to your website and automatic renewals. One thing that really bothers me when people say that Let&#8217;s Encrypt is the ... <span class="more"><a class="more-link" href="https://www.extreg.com/blog/2016/06/the-problem-with-lets-encrypt-or-someones/">[Read more...]</a></span></p>
<p>The post <a rel="nofollow" href="https://www.extreg.com/blog/2016/06/the-problem-with-lets-encrypt-or-someones/">The problem with Let&#8217;s Encrypt (or someone&#8217;s)</a> appeared first on <a rel="nofollow" href="https://www.extreg.com">Pietari Heino&#039;s personal website</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><a href="https://letsencrypt.org/">Let&#8217;s Encrypt</a> gives you free DV certificates via easy to use, automated process. Just install their script, or choose one from the gazillion of custom ones, and you&#8217;re good to go with a strong encryption to your website and automatic renewals.</p>
<p>One thing that really bothers me when people say that Let&#8217;s Encrypt is the solution to everything is that&#8230; it isn&#8217;t when you cannot use it. If you are not a server person, your website rests at a web hosting company&#8217;s shared platform where you do not have any say in Apache/NGINX configs, cannot apt-get, or curl | bash. You most likely don&#8217;t even have any clue what those terms mean. So Let&#8217;s Encrypt doesn&#8217;t solve the problem for shared hosting plans <em><strong>as long as the web hosting companies don&#8217;t provide it</strong></em>. Simple as that. It really gets into my nerves when people comment on forums that everyone should be using Let&#8217;s Encrypt and that now we&#8217;ve got a free solution there is *<strong>nothing* </strong>that could keep even a single person from turning on the green lock. Like really, most small to mid-sized companies have their web sites running on shared hosting. Not possible to rely solely on the port 443.</p>
<p>That&#8217;s it. Let&#8217;s Encrypt is a wonderful thing and I really like it but it just so bugs me when uneducated or ignorant people slam it to other peoples&#8217; faces without actually thinking for a moment if it can even be applied here and there.</p>
<p>I hope CPanel and the rest implement it soon enough and more so that the shared hosting providers turn on the knobs for easy enabling.</p>
<p>The post <a rel="nofollow" href="https://www.extreg.com/blog/2016/06/the-problem-with-lets-encrypt-or-someones/">The problem with Let&#8217;s Encrypt (or someone&#8217;s)</a> appeared first on <a rel="nofollow" href="https://www.extreg.com">Pietari Heino&#039;s personal website</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.extreg.com/blog/2016/06/the-problem-with-lets-encrypt-or-someones/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">58</post-id>	</item>
	</channel>
</rss>
