Differences
This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
opennic:tls [2020-05-31T18:37:09Z] – [Current deployment] deep42thought | opennic:tls [2025-01-10T17:09:56Z] (current) – Update Debian instructions koala | ||
---|---|---|---|
Line 10: | Line 10: | ||
* The acme server runs experimental software. If you have any problems getting a certificate, | * The acme server runs experimental software. If you have any problems getting a certificate, | ||
+ | ===== How to get started ===== | ||
+ | |||
+ | The acme server runs on a domain which must be validated by the same root certificate which is used for other opennic domains. | ||
+ | Thus, one must download the root certificate (and ignore the certificate error on the https connection) and install it as a trusted root certificate. | ||
+ | If you like to avoid possible MITM attacks on the download, you can verify the [[https:// | ||
+ | < | ||
+ | cd / | ||
+ | curl --insecure -o opennic_root_ca.crt https:// | ||
+ | curl https:// | ||
+ | trust extract-compat | ||
+ | </ | ||
+ | On debian, the commands are rather: | ||
+ | < | ||
+ | cd / | ||
+ | curl --insecure -o opennic_root_ca.crt https:// | ||
+ | curl https:// | ||
+ | dpkg-reconfigure ca-certificates | ||
+ | </ | ||
+ | Check, that the certificate was installed correctly: | ||
+ | < | ||
+ | curl https:// | ||
+ | </ | ||
+ | Then, certbot can query new certificates from the acme server. | ||
+ | < | ||
+ | certbot --server https:// | ||
+ | </ | ||
===== Planned deployment ===== | ===== Planned deployment ===== | ||
Line 19: | Line 45: | ||
The following things might be desirable, too: | The following things might be desirable, too: | ||
- | | + | - Distribute the Root CA key amongst multiple persons: either share copies, have multiple such keys, or have [[https:// |
- | | + | |
- Deploy multiple intermediate CAs / ACME-server " | - Deploy multiple intermediate CAs / ACME-server " |