Differences
This shows you the differences between two versions of the page.
| Both sides previous revision Previous revision Next revision | Previous revision | ||
| opennic:tls [2020-06-03T08:42:45Z] – [Planned deployment] deep42thought | opennic:tls [2025-01-10T17:09:56Z] (current) – Update Debian instructions koala | ||
|---|---|---|---|
| Line 10: | Line 10: | ||
| * The acme server runs experimental software. If you have any problems getting a certificate, | * The acme server runs experimental software. If you have any problems getting a certificate, | ||
| + | ===== How to get started ===== | ||
| + | |||
| + | The acme server runs on a domain which must be validated by the same root certificate which is used for other opennic domains. | ||
| + | Thus, one must download the root certificate (and ignore the certificate error on the https connection) and install it as a trusted root certificate. | ||
| + | If you like to avoid possible MITM attacks on the download, you can verify the [[https:// | ||
| + | < | ||
| + | cd / | ||
| + | curl --insecure -o opennic_root_ca.crt https:// | ||
| + | curl https:// | ||
| + | trust extract-compat | ||
| + | </ | ||
| + | On debian, the commands are rather: | ||
| + | < | ||
| + | cd / | ||
| + | curl --insecure -o opennic_root_ca.crt https:// | ||
| + | curl https:// | ||
| + | dpkg-reconfigure ca-certificates | ||
| + | </ | ||
| + | Check, that the certificate was installed correctly: | ||
| + | < | ||
| + | curl https:// | ||
| + | </ | ||
| + | Then, certbot can query new certificates from the acme server. | ||
| + | < | ||
| + | certbot --server https:// | ||
| + | </ | ||
| ===== Planned deployment ===== | ===== Planned deployment ===== | ||