On Sat, Oct 19, 2019 at 08:14:33PM +0200, Florian Zumbiehl wrote:
> Is there any plan to fix this bug before then, or will users have to work
> around this individually to avoid running into expired certificates? And if
> the latter, what is the recommended workaround? Is the current backports
> version usable?

The current version in stretch-backports is perfectly usable.  It also
moves to the v2 version of the ACME API, which is the only one that
Let's Encrypt now supports.

In fact, the proposed "fix" I'm working on is to actually get the
version that is currently in backports directly in the oldstable
distribution, but I need to tweak it a bit as to do that I need to
reintroduce the 'letsencrypt.sh' compatibility packages/scripts.

So, yes, if you are affected by this bug I recommended to just use the
version in stretch-backports.

-- 
regards,
                        Mattia Rizzolo

GPG Key: 66AE 2B4A FCCF 3F52 DA18  4D18 4B04 3FCD B944 4540      .''`.
More about me:  https://mapreri.org                             : :'  :
Launchpad user: https://launchpad.net/~mapreri                  `. `'`
Debian QA page: https://qa.debian.org/developer.php?login=mattia  `-

Attachment: signature.asc
Description: PGP signature

Reply via email to