💾 Archived View for bbs.geminispace.org › u › Supernova › 4546 captured on 2024-07-09 at 06:00:54. Gemini links have been rewritten to link to archived content

View Raw

More Information

⬅️ Previous capture (2024-06-16)

➡️ Next capture (2024-08-18)

🚧 View Differences

-=-=-=-=-=-=-

Comment by 🔭 Supernova

Re: "How many here use the same TLS certificate on their gemini..."

In: s/Gemini

Oh thank you @michaelnordmeyer and @Morgan for bringing up the point about getting notified when there is a new cert. I've tried to find posts about the differences between self-signed and CA certs and never came across that info. I suppose that doesn't effect any functionality, it's just a notification the user has to dismiss each time?

@alexlehm can you explain further or provide a link to more info on using the same key?

How about this for a thought? If I generate a long expiring cert from LetsEncrypt once just for the gemini server and save that seperately. Then let LetsEncrypt do it's normal thing (every 3 months) for the web server?

🔭 Supernova [OP]

2023-08-19 · 11 months ago

7 Later Comments ↓

🍵 michaelnordmeyer · 2023-08-19 at 14:09:

@supernova AFAIK Let's Encrypt only supports three months durations for security reasons.

Gemini doesn't support the chain of trust you have on the webs. Instead, it's trust-on-first-use. So any valid certificate will suffice as clients automatically trust valid ones, even self-signed ones.

If a certificate returned form a known (=visited) server changes, the client should display an alert. The user can then decide to again trust this new certificate and the client will subsequently silently accept this new certificate.

So it's not very secure in absolute terms. But you can get a secure transport, if the first certificate you (automatically) trusted was the proper one while having a very long expiration date.

🤖 alexlehm · 2023-08-19 at 15:26:

@Morgan is set the parameter reuse_key = True in renewal.conf, that seems to keep the same cert data so that the hash does not change

🤖 alexlehm · 2023-08-19 at 15:27:

@Supernova I believe this only requires the parameter reuse_key = True in the config. It is not possible to create long expiring certs with Letsencrypt, the expire time is automatically 3 months, you cannot change that

🍀 gritty · 2023-08-19 at 17:08:

for those using LE, are you copying your keys to the user running your server? I ask because after using certbot, the directory holding the LE certs is not viewable by a regular user on my machine.

🤖 alexlehm · 2023-08-19 at 17:36:

I copy the files with sudo and access them with the user the server is running under

🔭 Supernova [OP] · 2023-08-19 at 23:09:

@alexlehm Oh there is a runtime option, and I use docker certbot so I think I can use it this way:

docker compose run --rm certbot renew --reuse-key

I will see what happens next month upon renewal 😁

🐉 gyaradong · 2023-08-20 at 04:34:

I see the purpose as different. The point of minting a key is to have a centralised chain of trust. I think the key life times are for the CA to validate or audit the keys. CRLs are not always effective, so everything must have a lifetime.

In Gemini, it's TOFU so the utility of a lifetime and of minting are both limited and across purposes.

Original Post

🌒 s/Gemini

How many here use the same TLS certificate on their gemini server that they get for their web server? I found it not too hard to setup. I am surprised I don't see more gemini capsules doing the same.

💬 Supernova · 13 comments · 2023-08-19 · 11 months ago · #certificates