I thought William S. had mentioned something about a Let's Encrypt hook instead of a cron job. From what I've been reading, one's script simply goes in /etc/letsencrypt/renewal-hooks/{pre,post,deploy] or something like that, true? Then I suppose one calls certbot renew --deploy-hook or something like that. The documentation seemed sparse, anyway...
Pipe in William if you have something. On Tue, Apr 16, 2024 at 6:33 AM Gary Bowling <g...@gbco.us> wrote: > > I'll help edit it if someone else that is currently going through it wants > to start it. Maybe set up a google doc and give some people edit access. > Or give read only access and we can drop comments/suggestions back here for > someone to edit. It's been a long time since I set it up from scratch, so > I'm a bit rusty on that. > > > It shouldn't be too hard to come up with something. I like to do > everything "standard" via the RH/Rocky way of doing it. That way dnf > updates work and I don't have as much maintenance. So I don't compile, > customize anything unless I'm forced to. > > > The only special part on my install is the script to "cat" the certs and > create a servercert.pem. Especially with your new updates, if it works with > ECDSA certs, then no need for that custom rsa 2048 config part. > > > With that, it should just be installing httpd, certbot, and doing a > standard config for the server name. The only complication being if you use > different names.. e.g. webmail.domain.com and mail.domain.com or > something. It's much simpler if you use the same name for both since > letsencrypt queries back to the dns name you set up on apache to validate. > If you don't use the same name, you either have to set up a dummy > virtualhost in apache to do the challenge validation on that name, or you > have to use another challenge method like DNS-01 to update your certs. > Toaster doc should probably have examples of both. > > > Here's a generic letsencrypt setup for Rocky 8/9 and apache. Needs some > tweaks to do the challenge verification back to your roundcube apache > virtualhost instead of the default /var/www/html/ query. Or if you have > separate names you can use the /var/www/html/ for the dummy virtualhost to > get your mail server certs, but you'll still need another one for the > roundcube virtualhost. > > > > https://www.cyberciti.biz/faq/how-to-secure-apache-with-lets-encrypt-certificates-on-rhel-8/ > > > Hope this helps.. Gary > > > On 4/15/2024 1:33 PM, Eric Broch wrote: > > Anyone feel like doing a write-up and I'll put it on the wiki? > > On 4/15/2024 11:18 AM, Gary Bowling wrote: > > > > Ah, right. Actually it looks like I can just place my script that I > currently run in my cron job in the /etc/letsencrypt/renewal-hooks/post/ > directory and it will run as a "post renew" script. > > > Thanks for that. > > Gary > > > On 4/15/2024 1:04 PM, William Silverstein wrote: > > I would not use a cron script. I use --deploy-hook option on the > certbot-auto to handle it. > > > On Mon, April 15, 2024 9:59 am, Gary Bowling wrote: > > Great. One question. Seems like everything on my server uses > /var/qmail/control/servercert.pem for the cert. Dovecot and qmail > all use that file. And I have a cron job that runs once a month to > check for a new letsencrypt cert and if there is one it copies it > over to servercert.pem to update my mail server. > > > > > > Is that the correct way to handle that? Or is that something that is > left over from my old server that I moved over? > > > > > Thanks, Gary > > > > > On 4/15/2024 12:44 PM, Eric Broch wrote: > > > Neither, > > /var/qmail/control/dh2048.pem > /var/qmail/control/rsa2048.pem > > > On 4/15/2024 10:33 AM, Gary Bowling wrote: > > > > > > Thanks, will still require rsa? > > > > On 4/15/2024 10:47 AM, Eric Broch wrote: > > > My next iteration on EL9 will remove keysize it's deprecated, > has been for a while. Should have the new code out within the > week. > > SSL_CTX_set_tmp_rsa_callback · openssl/openssl · > Discussion #23769 (github.com) > > > > On 4/15/2024 6:25 AM, Gary Bowling wrote: > > > > > > Hey Jeff, glad you're making progress. Be aware that when > you get a new cert from Letsencrypt that the default now > retrieves an ECDSA cert. Which is fine for apache, but > doesn't work on qmail, or at least it didn't for me. To fix > that you'll need to configure letsencrypt to give you an RSA > 2048 cert. > > > > > > There are two ways to do that. If you want all your certs to > be RSA 2048, you can add this to the > /etc/letsencrypt/cli.ini file. > > key-type = rsa > rsa-key-size = 2048 > > > > > If you just want to do that for your keys you use in qmail, > then you can put the above in the > /etc/letsencrypt/renewal/domain.conf file. Where "domain" is > the name of the cert you're renewing. Certbot creates the > file so it should already be there. > > > > > Gary > > > > > On 4/14/2024 10:39 PM, Jeff Koch wrote: > > I may have resolved this. I > did > the Rocy9 > distro install of apache and > copied the > mod_http2.so file over to our > install of apache. Seems > to work (no errors) > but I won't know for sure until > we setup Lets > Encrypt SSL certbot tomorrow > > Jeff > > On 4/14/2024 3:11 PM, Jeff Koch wrote: > > > Hi - we're setting up a new mailserver with Rocky 9 and > the learning curve is slow as is usual with > the first time with a new distro. > > Anyway because our various scripts look for apache at > /usr/local/apache/ we've decided to compile > our own binary with the latest apache and > have run into trouble / errors related to > 'nghttp2'. > > We did download, compile and install the latest > nghttp2-1.61.0 from github. The configure and make > went well and http1.1 works but apache > generates the following error when we > activate mod_http2 > >  (Cannot load modules/mod_http2.so into server: > /usr/local/apache2/modules/mod_http2.so: undefined > symbol: > nghttp2_option_set_no_rfc9113_leading_and_trailing_ws_validation) > > If anyone on the list has compiled their own httpd > 2.4.59 with Rocky 9 would you mind sharing the > details ? > > Thanks, Jeff Koch > > > > > --------------------------------------------------------------------- > To unsubscribe, e-mail: > qmailtoaster-list-unsubscr...@qmailtoaster.com > For additional commands, e-mail: > qmailtoaster-list-h...@qmailtoaster.com > --------------------------------------------------------------------- > To unsubscribe, e-mail: > qmailtoaster-list-unsubscr...@qmailtoaster.com For > additional commands, e-mail: > qmailtoaster-list-h...@qmailtoaster.com > --------------------------------------------------------------------- > To unsubscribe, e-mail: > qmailtoaster-list-unsubscr...@qmailtoaster.com For > additional commands, e-mail: > qmailtoaster-list-h...@qmailtoaster.com > > --------------------------------------------------------------------- To > unsubscribe, e-mail: qmailtoaster-list-unsubscr...@qmailtoaster.com For > additional commands, e-mail: qmailtoaster-list-h...@qmailtoaster.com > > > --------------------------------------------------------------------- > To unsubscribe, e-mail: qmailtoaster-list-unsubscr...@qmailtoaster.com > For additional commands, e-mail: qmailtoaster-list-h...@qmailtoaster.com > > --------------------------------------------------------------------- To > unsubscribe, e-mail: qmailtoaster-list-unsubscr...@qmailtoaster.com For > additional commands, e-mail: qmailtoaster-list-h...@qmailtoaster.com