Hacker News new | past | comments | ask | show | jobs | submit login

> LE has saved us from spending many man hours of time updating certificates

Just out of interest, how are you managing the 90-day renewal schedule? Don't you need some means of verifying that timely renewal has occurred.

Since you mention dev and staging I assume you've implemented a central certificate-management server that talks with LE and then issues the certs to the internal machines?




Use cert bot to auto renew https://certbot.eff.org/docs/using.html#renewing-certificate...

Also include command like below as part of your automated audit scripts:

echo | openssl s_client -connect google.com:443 2>/dev/null | openssl x509 -noout -dates

http://www.shellhacks.com/en/HowTo-Check-SSL-Certificate-Exp...


FYI, you can simplify that to

openssl s_client -connect google.com:443 </dev/null 2>&1 | openssl x509 -noout -enddate


> Just out of interest, how are you managing the 90-day renewal schedule?

Not the parent, but I use certbot running monthly with a cron job. It skips any domains that aren't up for renewal, and renews domains when they are close to expiry.

I then get a monthly email telling me which domains were updated and which ones were skipped.

It's completely painless. 90-day renewal isn't a problem when the whole process is completely automated.


I would (and do) run it weekly.

If it runs monthly, and one of your renewals fails (i.e. transient network error), your certificate may expire before it next gets the opportunity to renew it.


And then I get an email from cron telling me it failed, and I log in and run certbot manually.

I don't run enough sites that this is a problem.


No, we tend to keep our staging and dev servers public-facing for the most part. We do a lot of remote work, and it's easier that way.

Everything is kept behind our application authentication, and they almost never have "real data" on them so it's not really an issue for us. And having the certs on the dev machines just makes setting up and testing with HTTPS that much easier and it's a no-brainer with LE (plus it lets us ensure that everything there is working correctly, and gives us fully authenticated HTTPS connections with our dev servers!)

In the rare event that we need a dev server and can't put it behind our application auth, it's generally locked to localhost and we use SSH forwarding until it can be.

As for managing the lifetimes, we just use certbot the same as we do for the production machines, similar to the way the other commenter pointed out. And I believe one of our guys has some alerts setup for monitoring the expiration of the certs and warning if it gets too close to expiring, but I don't really know anything about how that works.


Presumably, you would want to have monitoring in place for certificate expiration either way, so this expense is not really specific to short-lived certificates.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: