Lyle Giese said:
> Let's Encrypt requires (according to documentation I have seen) Port 80
> TCP be in use for verification.� I have no other legit use for Port 80
> on this smart host and decided a long time ago, not to use Let's Encrypt
> for that reason. 

It's trying to verify that you control the systems that the DNS points to. 
 (So it doesn't give you a certificate for google.com or such.)  It does 
that by making a TCP connection to that address, or all of them if there 
are more than one.  An example is IPv4 and IPv6 on the same system.

For an Apache web server, certbot has an Apache plugin that knows how to 
tell the server to provide a "page" containing a magic token.  I don't 
know the details of how it does that.  I think it tells Apache to reload 
the new certificate but I have never done that.  Minimal hassle once you 
get it setup.

If you create the certificate with "certbot certonly --standalone" certbot 
will setup a temporary server on port 80.  (or crash if you are already 
running something there)  It's up to you to tell your server where to find 
the certificate and key and/or copy them to where your server can access 
them.  Works fine for me.  (I'm using it for NTS -- network time security. 
No web server in sight.)


-- 
These are my opinions.  I hate spam.



_______________________________________________
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop

Reply via email to