Dnia  7.04.2025 o godz. 08:14:34 Klaus Ethgen via mailop pisze:
> 
> With this Lets-Encrypt-stuff comes that the certificate needs to be
> replaced every 3 Months. I do not have all the time to replace them that
> often.
> 
> Yea, I know, there are tools. But I wont trust that tools to modify my
> configuration every Month.

I was preparing to set up Lets Encrypt certificates on my server (mostly for
HTTPS, because I host a few websites, that still to this day use self-signed
certs, but as I'm already doing it, will use the cert for mail too). I
haven't done it yet, but during this preparation I found an extremely
simple shell script called "bacme". I modified the script a bit since it
didn't work "out of the box" for me, and also I wanted to slightly change
the way it workde, but once I got it working, I find it a very nice tool,
particularly for people who don't want some opaque tools messing with the
configuration. 

All this script does is to generate keys and CSRs for specified domains,
submit them to Lets Encrypt and receive generated certificates. It does not
change anything in your configuration, besides updatig the certificates in
specified location (that you can *manually* refer to in your config). It can
optionally, when requesting the certificates for the first time, place the
HTTP challenge files into your web directories, but you can skip this step
and do it manually. Also, you need this only when requesting certs for the
first time - if you are renewing the cert, using the same private key, the
domain is considered already validated and challenge is not verified again.
This is where I modified the script, because in the original version it
generated a new private key each time, and even more, it used a new Lets
Encrypt account each time (the account is also determined by a specific
"account key" that you need to generate). I modified the script that it uses
the same account key if it already exists, and it uses the same private key
and CSR for a domain to renew the cert, if it already exists.

You can just run this script manually when certificate is about to expire to
renew it, or you can write a simple cron job that calls certwatch (install
it if you don't already have it) and if certwatch returns a status that
the certificate is about to expire, then call the "bacme" script to renew.
That's a very simple automation that doesn't mess with your config at all.

I can send you my modified version of that script if you wish.

> I have a very accurate SPF. But I refuse to use any other than `-all` as
> without it, it would make SPF useless! I never ever want any other host
> to send mails in my name!

I hope you are well aware of the consequences (eg. that this does break
forwarding) and accept them.

> >  * Don't do sender callout verification to SMTP servers which aren't
> >    yours.
> 
> Why not?

Because many receiving servers now consider this as malicious activity and
will put you on the blocklists if you do this.
-- 
Regards,
   Jaroslaw Rafa
   r...@rafa.eu.org
--
"In a million years, when kids go to school, they're gonna know: once there
was a Hushpuppy, and she lived with her daddy in the Bathtub."
_______________________________________________
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop

Reply via email to