The "cleanup" cron job for the user _honk will run in HOME which is /var/honk
If another user runs that cron job, set HOME=/var/honk or `cd /var/honk && honk cleanup` or `honk -datadir /var/honk cleanup` and .db permission On September 28, 2022 4:57:51 PM UTC, "Gonzalo L. Rodriguez" <gonz...@x61.sh> wrote: >On Wed, 21 Sep 2022 at 10:49:27 -0400, Horia Racoviceanu wrote: >> ping >> >> On 9/16/22, Horia Racoviceanu <ho...@racoviceanu.com> wrote: >> > - Changed the certificate renewal cron job based on the OCSP staple >> > interval for letsencrypt (for buypass it should be changed to run >> > every 7th hour) and based on the update steps listed by Stuart >> > - Replaced VARBASE with LOCALSTATEDIR >> > >> > I'd like to keep the acme-client and ocspcheck configuration in the >> > port README because I know some less OpenBSD savvy people who >> > installed the Honk package. >> > >> > On 7/31/22, Christoph Roland Winter <me@the.floof.rocks> wrote: >> >> BTW what you think about a section in the FAQ about httpd, relayd, >> >> acme-client for all web applications. >> >> >> >> Am 31.07.22 um 13:12 schrieb Stuart Henderson: >> >>> 1. The staple needs to be updated periodically >> >>> >> >>> 2. If the certificate is updated the staple needs to be updated too >> >>> >> >>> 3. If either the certificate or the staple are changed, relayd needs a >> >>> reload >> >>> >> >>> To be honest I'm not sure if it really belongs in the doc for some >> >>> random port in www, this applies to anyone using relayd to front-end a >> >>> web application. >> >>> >> >>> -- >> >>> Sent from a phone, apologies for poor formatting. >> >>> >> >>> >> >>> On 31 July 2022 02:16:13 Christoph Roland Winter <me@the.floof.rocks> >> >>> wrote: >> >>> >> >>>> Beside of this question, the idea of OCSP is >> >>>> >> >>>> By turning on OCSP Stapling, you can improve the performance of your >> >>>> website, provide better privacy protections for your users, and help >> >>>> Let’s Encrypt efficiently serve as many people as possible. >> >>>> >> >>>> https://letsencrypt.org/docs/integration-guide/ >> >>>> >> >>>> Is it better to update the OCSP file before it expires or update it >> >>>> only >> >>>> seldom (in this case the question is, whether it is not better to don't >> >>>> use OCSP). >> >>>> >> >>>> Am 31.07.22 um 00:33 schrieb Horia Racoviceanu: >> >>>>> I've switched the cron job to chaining acme-client && ocspcheck on >> >>>>> June 20. >> >>>>> Both the certificate and the OCSP response were last updated on June >> >>>>> 20. >> >>>>> >> >>>>> # ocspcheck -vNi /etc/ssl/honk.example.com.{ocsp,crt} >> >>>>> ocspcheck: Invalid OCSP reply: this update is too old Mon Jun 20 >> >>>>> 05:46:59 2022 >> >>>>> >> >>>>> relayd and Firefox do not complain. >> >>>>> >> >>>>> ssllabs.com reports: >> >>>>> >> >>>>> OCSP Must Staple No >> >>>>> OCSP stapling Yes >> >>>>> OCSP STAPLING ERROR: OCSP response expired on Mon Jun 20 20:46:59 UTC >> >>>>> 2022 >> >>>>> >> >>>>> Can the OCSP STAPLING ERROR be ignored? >> >>>>> >> >>>>> On 7/30/22, Christoph Roland Winter <me@the.floof.rocks> wrote: >> >>>>>> Welcome. >> >>>>>> >> >>>>>> The question is then, why the OCSP staple file expires after hours or >> >>>>>> 7 >> >>>>>> days and the certificate will be renewed after 60 days following man >> >>>>>> 1 >> >>>>>> acme-client >> >>>>>> >> >>>>>> -F Force certificate renewal, even if it has more than 30 days >> >>>>>> validity. >> >>>>>> >> >>>>>> It can't be the idea to have so long a expired OCSP file (saw Firefox >> >>>>>> in >> >>>>>> the past complain when a outdated OCSP file exists). So, if you >> >>>>>> replace >> >>>>>> the first && with a ; nothing will change as the last && to reload >> >>>>>> relayd will only happen if the cert or the OCSP file (or both) was >> >>>>>> renewed and if booth are up to date nothing will happen. >> >>>>>> >> >>>>>> Just my 2 cents. >> >>>>>> >> >>>>>> Regards, >> >>>>>> >> >>>>>> >> >>>>>> Christoph >> >>>>>> >> >>>>>> Am 30.07.22 um 19:07 schrieb Horia Racoviceanu: >> >>>>>>> Thanks for testing! >> >>>>>>> >> >>>>>>> As Stuart Henderson mentioned, >> >>>>>>>> You do really want to update OCSP if a cert has been renewed. >> >>>>>>> >> >>>>>>> On 7/29/22, Christoph Roland Winter <me@the.floof.rocks> wrote: >> >>>>>>>> Hello, >> >>>>>>>> >> >>>>>>>> I have only kept the first message and was some time not subscribed >> >>>>>>>> to >> >>>>>>>> the list - lets see, where the message ends. >> >>>>>>>> >> >>>>>>>> I tried the latest patch from >> >>>>>>>> https://marc.info/?l=openbsd-ports&m=165827470732358&q=p3 and it >> >>>>>>>> worked >> >>>>>>>> fine using >> >>>>>>>> >> >>>>>>>> OpenBSD 7.2-beta (GENERIC.MP) #654: Wed Jul 27 20:10:05 MDT 2022 >> >>>>>>>> and the >> >>>>>>>> -current ports tree using amd64. >> >>>>>>>> >> >>>>>>>> Maybe I am wrong but the crontab from the above patch >> >>>>>>>> >> >>>>>>>> +~ ~ * * * acme-client honk.example.com && ocspcheck -No >> >>>>>>>> ${SYSCONFDIR}/ssl/honk.example.com.{ocsp,crt} && rcctl reload >> >>>>>>>> relayd >> >>>>>>>> >> >>>>>>>> needs to be modified. The first && must be replaced with ; (or >> >>>>>>>> splited >> >>>>>>>> in 2 cron jobs). As it is now, the ocsp file gets only renewed all >> >>>>>>>> 60 >> >>>>>>>> days, as acme-client renews the certificate only 30 days before it >> >>>>>>>> expires (checked with the -v option and as nothing happened before, >> >>>>>>>> && >> >>>>>>>> stops at this point). BTW my ocsp file with the above command is >> >>>>>>>> valid >> >>>>>>>> for 7 days. >> >>>>>>>> >> >>>>>>>> ocspcheck -vNo /etc/ssl/the.floof.rocks.{ocsp,crt} >> >>>>>>>> Using http to host r3.o.lencr.org, port 80, path / >> >>>>>>>> OCSP response validated from r3.o.lencr.org >> >>>>>>>> This Update: Thu Jul 28 15:00:00 2022 >> >>>>>>>> Next Update: Thu Aug 4 14:59:58 2022 >> >>>>>>>> >> >>>>>>>> The only thing I did was using the /etc/examples/acme-client.conf >> >>>>>>>> file, >> >>>>>>>> added my email and added the domain blocks. >> >>>>>>>> >> >>>>>>>> Regards, >> >>>>>>>> >> >>>>>>>> >> >>>>>>>> Christoph >> >>>>>>>> >> >>>>>>>> >> >>>>>>>> Am 01.06.22 um 23:37 schrieb Horia Racoviceanu: >> >>>>>>>>> Upgrade to v0.9.8 >> >>>>>>>>> - Add MESSAGE >> >>>>>>>>> - Update README >> >>>>>>>>> >> >>>>>>>>> changelog >> >>>>>>>>> >> >>>>>>>>> === 0.9.8 Tentative Tentacle >> >>>>>>>>> >> >>>>>>>>> + Switch database to WAL mode. >> >>>>>>>>> >> >>>>>>>>> - go version 1.16 required. >> >>>>>>>>> >> >>>>>>>>> + Specify banner: image in profile. >> >>>>>>>>> >> >>>>>>>>> + Update activity compatibility with mastodon. >> >>>>>>>>> >> >>>>>>>>> - Signed fetch. >> >>>>>>>>> >> >>>>>>>>> + Better unicode hashtags. >> >>>>>>>>> >> >>>>>>>>> + Some more configuration options. >> >>>>>>>>> >> >>>>>>>>> + Some UI improvements to web interface. >> >>>>>>>>> >> >>>>>>>>> + Add atme class to mentions >> >>>>>>>>> >> >>>>>>>>> + Improvements to the mastodon importer. >> >>>>>>>>> >> >>>>>>>>> + More hydration capable pages. >> >>>>>>>>> >> >>>>>>>>> + Support for local.js. >> >>>>>>>>> >> >>>>>>>>> + Better error messages for timeouts. >> >>>>>>>>> >> >>>>>>>>> + Some improved html and markdown. >> >>>>>>>> >> >>>>>> >> >>> >> >> >> > >> > >Asking as a new user, that cronjob to "cleanup" won't fail without the .db in >that PATH? >