mastodon.ie is one of the many independent Mastodon servers you can use to participate in the fediverse.
Irish Mastodon - run from Ireland, we welcome all who respect the community rules and members.

Administered by:

Server stats:

1.5K
active users

#acme

2 posts2 participants0 posts today
hdr<p>'Emacs is what you get when a Unix-illiterate hacker sits down and tries to write a text editor. Vi is what you get when a Unix hacker sits down and tries to write a text editor. Acme is what you get when one of the members of the original Unix team sits down to tries to write a text editor.'</p><p>—Hernán Rondelli</p><p><a href="https://hachyderm.io/tags/vi" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vi</span></a> <a href="https://hachyderm.io/tags/acme" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>acme</span></a> <a href="https://hachyderm.io/tags/bsd" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bsd</span></a> <a href="https://hachyderm.io/tags/unix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>unix</span></a></p>
Stefan Eissing<p>A post about the new ACME ARI support in Apache httpd.</p><p><a href="https://chaos.social/tags/apache" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>apache</span></a> <a href="https://chaos.social/tags/acme" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>acme</span></a> <br><a href="https://eissing.org/icing/posts/apache-acme-ari/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">eissing.org/icing/posts/apache</span><span class="invisible">-acme-ari/</span></a></p>
Marlena (awawawa)<p>Buypuss will discontinue TLS Certificate issueing on 2025-10-15<br><a href="https://community.buypass.com/t/y4y130p" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">community.buypass.com/t/y4y130p</span><span class="invisible"></span></a></p><p>Anyone knows any good non-us alternatives?</p><p><a href="https://toot.kif.rocks/tags/buypass" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>buypass</span></a> <a href="https://toot.kif.rocks/tags/acme" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>acme</span></a> <a href="https://toot.kif.rocks/tags/letsencrypt" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>letsencrypt</span></a></p>
Beowulf<p>So we have again only <a href="https://beosocial.de/tags/letsencrypt" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LetsEncrypt</span></a> for free <a href="https://beosocial.de/tags/acme" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ACME</span></a> SSL certificates?</p><blockquote><p>Buypass Terminates Issuance of GoSSL Certificates</p></blockquote><p><a href="https://community.buypass.com/t/y4y130p" rel="nofollow noopener" target="_blank">https://community.buypass.com/t/y4y130p</a></p>
Flippin' 'eck, Tucker!<p>So farewell<br>Certbot</p><p>You were very useful<br>But now you've been replaced<br>By a very small<br>Nginx module</p><p><a href="https://blog.nginx.org/blog/native-support-for-acme-protocol" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.nginx.org/blog/native-sup</span><span class="invisible">port-for-acme-protocol</span></a></p><p><a href="https://social.chatty.monster/tags/certbot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>certbot</span></a> <a href="https://social.chatty.monster/tags/acme" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>acme</span></a> <a href="https://social.chatty.monster/tags/nginx" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nginx</span></a> <a href="https://social.chatty.monster/tags/LetsEncrypt" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LetsEncrypt</span></a></p>
Kushal Das :python: :tor:<p><a href="https://blog.nginx.org/blog/native-support-for-acme-protocol" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.nginx.org/blog/native-sup</span><span class="invisible">port-for-acme-protocol</span></a> this will be helpful. <a href="https://toots.dgplug.org/tags/ACME" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ACME</span></a> <a href="https://toots.dgplug.org/tags/NGINX" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NGINX</span></a> <span class="h-card" translate="no"><a href="https://infosec.exchange/@letsencrypt" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>letsencrypt</span></a></span> <a href="https://toots.dgplug.org/tags/TLS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TLS</span></a> <a href="https://toots.dgplug.org/tags/certificates" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>certificates</span></a> <a href="https://toots.dgplug.org/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://toots.dgplug.org/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a></p>
nico[lien] <a href="https://blog.nginx.org/blog/native-support-for-acme-protocol" rel="nofollow noopener" target="_blank">NGINX Introduces Native Support for ACME Protocol - Lobsters (</a><a href="http://blog.nginx.org" rel="nofollow noopener" target="_blank">blog.nginx.org</a> via indigo) <a class="hashtag" href="https://social.tourmentine.com/tag/security" rel="nofollow noopener" target="_blank">#security</a> <a class="hashtag" href="https://social.tourmentine.com/tag/acme" rel="nofollow noopener" target="_blank">#acme</a> <a class="hashtag" href="https://social.tourmentine.com/tag/gik" rel="nofollow noopener" target="_blank">#gik</a> <a class="hashtag" href="https://social.tourmentine.com/tag/ngx" rel="nofollow noopener" target="_blank">#ngx</a> <a class="hashtag" href="https://social.tourmentine.com/tag/tls" rel="nofollow noopener" target="_blank">#tls</a> <a class="hashtag" href="https://social.tourmentine.com/tag/net" rel="nofollow noopener" target="_blank">#net</a>
Alexandre :freebsd:<p><a href="https://mastodon.bsd.cafe/tags/NGINX" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NGINX</span></a> Native support for <a href="https://mastodon.bsd.cafe/tags/ACME" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ACME</span></a> protocol<br><a href="https://blog.nginx.org/blog/native-support-for-acme-protocol" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.nginx.org/blog/native-sup</span><span class="invisible">port-for-acme-protocol</span></a><br><a href="https://mastodon.bsd.cafe/tags/Web" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Web</span></a> <a href="https://mastodon.bsd.cafe/tags/Webserver" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Webserver</span></a></p>
Kamalavelan<p><a href="https://blog.nginx.org/blog/native-support-for-acme-protocol" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.nginx.org/blog/native-sup</span><span class="invisible">port-for-acme-protocol</span></a> </p><p>Competition is a funny thing. <a href="https://mastodon.xyz/tags/nginx" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nginx</span></a> finally introduces native support fort the <a href="https://mastodon.xyz/tags/ACME" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ACME</span></a> protocol.</p>
TechnoTenshi :verified_trans: :Fire_Lesbian:<p>NGINX releases preview of native ACME protocol support via new Rust-based module, enabling direct SSL/TLS certificate issuance and renewal from configuration without external tools like Certbot, aiming to simplify management and improve security.</p><p><a href="https://blog.nginx.org/blog/native-support-for-acme-protocol" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.nginx.org/blog/native-sup</span><span class="invisible">port-for-acme-protocol</span></a></p><p><a href="https://infosec.exchange/tags/nginx" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nginx</span></a> <a href="https://infosec.exchange/tags/acme" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>acme</span></a> <a href="https://infosec.exchange/tags/ssl" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ssl</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a></p>
Anthony Sorace<p>If you use Acme Mail on Plan 9 or Plan 9 from User Space, I'm curious: do you mostly use:</p><p><a href="https://pdx.social/tags/acme" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>acme</span></a> <a href="https://pdx.social/tags/plan9" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>plan9</span></a></p>
House Panther :verified_paw:<p><a href="https://goblackcat.social/tags/acme" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>acme</span></a> <a href="https://goblackcat.social/tags/oldskool" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>oldskool</span></a></p>
gyptazy<p>Am I really the only one who uses 24hrs long living certificates which get automatically renewed and signed by an own CA via ACME?</p><p><a href="https://mastodon.gyptazy.com/tags/ssl" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ssl</span></a> <a href="https://mastodon.gyptazy.com/tags/tls" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tls</span></a> <a href="https://mastodon.gyptazy.com/tags/dane" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dane</span></a> <a href="https://mastodon.gyptazy.com/tags/acme" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>acme</span></a> <a href="https://mastodon.gyptazy.com/tags/certificate" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>certificate</span></a> <a href="https://mastodon.gyptazy.com/tags/certificateauthority" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>certificateauthority</span></a> <a href="https://mastodon.gyptazy.com/tags/ca" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ca</span></a></p>
Deutsches Forschungsnetz (DFN)<p>🔐 DFN-PKI: HARICA automatisiert Zertifikatsprozesse</p><p>Gute Nachrichten für Einrichtungen im <a href="https://mastodon.social/tags/Wissenschaftsnetz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Wissenschaftsnetz</span></a> Der neue <a href="https://mastodon.social/tags/TCS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TCS</span></a> -Anbieter <a href="https://mastodon.social/tags/HARICA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HARICA</span></a> unterstützt jetzt das <a href="https://mastodon.social/tags/ACME" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ACME</span></a> -Protokoll – für die automatisierte Ausstellung &amp; Verwaltung von Zertifikaten. </p><p>Neu ist auch der Self-Service für <a href="https://mastodon.social/tags/S" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>S</span></a>/MIME -Zertifikate – inklusive Namensübernahme via <a href="https://mastodon.social/tags/DFNAAI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DFNAAI</span></a> &amp; ohne zusätzlichen Genehmigungsschritt. ✅<br>Alle Infos &amp; Doku: <a href="https://www.dfn.de/dfn-pki-harica/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">dfn.de/dfn-pki-harica/</span><span class="invisible"></span></a><br><span class="h-card" translate="no"><a href="https://mstdn.social/@geant" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>geant</span></a></span> <br><a href="https://mastodon.social/tags/DFN_PKI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DFN_PKI</span></a> <a href="https://mastodon.social/tags/ACME" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ACME</span></a></p>
Stefan Eissing<p>Apache ACME(mod_md) with ARI support:<br><a href="https://github.com/icing/mod_md/tree/v2.6.0?tab=readme-ov-file#acme-ari" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/icing/mod_md/tree/v</span><span class="invisible">2.6.0?tab=readme-ov-file#acme-ari</span></a></p><p><a href="https://chaos.social/tags/apache" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>apache</span></a> <a href="https://chaos.social/tags/acme" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>acme</span></a> </p><p><a href="https://github.com/icing/mod_md/releases/tag/v2.6.0" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/icing/mod_md/releas</span><span class="invisible">es/tag/v2.6.0</span></a></p>
Elias Probst<p><span class="h-card" translate="no"><a href="https://san-junipero.gimme-sympathy.org/@gewt" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>gewt</span></a></span> move to <a href="https://mastodon.social/tags/CaddyServer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CaddyServer</span></a> and there won't be a need for <a href="https://mastodon.social/tags/certbot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>certbot</span></a> anymore, since it comes with built-in <a href="https://mastodon.social/tags/ACME" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ACME</span></a> support and all tools and knobs one could wish for.</p><p>It comes with many sane defaults and thereby allows to run quite complex setups - yet only requiring very minimal configs.</p><p><a href="https://caddyserver.com/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">caddyserver.com/</span><span class="invisible"></span></a></p>
Steffo<p>Hmm, ejabberd seems unable to acquire TLS certificates from ZeroSSL, failing on requesting <code>HEAD https://acme.zerossl.com/v2/DV90/newNonce</code> with <code>HTTP error: unexpected content type: application/octet-stream</code>...</p><p>Not sure who to report that to.</p><p><a href="https://a.junimo.party/tags/XMPP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>XMPP</span></a> <a href="https://a.junimo.party/tags/ejabberd" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ejabberd</span></a> <a href="https://a.junimo.party/tags/ACME" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ACME</span></a> <a href="https://a.junimo.party/tags/ZeroSSL" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ZeroSSL</span></a></p>
Wesley Moore<p>Urgh I _still_ dislike dealing with TLS certs. The certificate on <a href="https://au.mirror.7bit.org/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">au.mirror.7bit.org/</span><span class="invisible"></span></a> expired earlier in the week, which was surprising because I thought I'd set everything up to automatically renew. Turns out I had, but I'd forgotten to include a Lego renew hook to restart nginx when the cert was renewed. Apparently I also didn't have monitoring of this cert (I do now) :facepalm:</p><p>Why is it that only Caddy and Traefik seem to have built in ACME clients?</p><p><a href="https://mastodon.decentralised.social/tags/acme" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>acme</span></a> <a href="https://mastodon.decentralised.social/tags/tls" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tls</span></a> <a href="https://mastodon.decentralised.social/tags/https" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>https</span></a> <a href="https://mastodon.decentralised.social/tags/LetsEncrypt" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LetsEncrypt</span></a></p>
gyptazy<p>Building Your Own PKI with Step-CA – From Root CA to Proxmox Integration with ACME!</p><p>In this <a href="https://mastodon.gyptazy.com/tags/HowTo" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HowTo</span></a> we create an own, decentralized PKE with <a href="https://mastodon.gyptazy.com/tags/stepca" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>stepca</span></a>, enable <a href="https://mastodon.gyptazy.com/tags/ACME" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ACME</span></a> and integrate a <a href="https://mastodon.gyptazy.com/tags/Proxmox" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Proxmox</span></a> node to obtain a certificate.</p><p><a href="https://mastodon.gyptazy.com/tags/proxmox" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>proxmox</span></a> <a href="https://mastodon.gyptazy.com/tags/stepca" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>stepca</span></a> <a href="https://mastodon.gyptazy.com/tags/opensource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opensource</span></a> <a href="https://mastodon.gyptazy.com/tags/howto" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>howto</span></a> <a href="https://mastodon.gyptazy.com/tags/homelab" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>homelab</span></a> <a href="https://mastodon.gyptazy.com/tags/enterprise" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>enterprise</span></a> <a href="https://mastodon.gyptazy.com/tags/pki" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pki</span></a> <a href="https://mastodon.gyptazy.com/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://mastodon.gyptazy.com/tags/decentralized" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>decentralized</span></a> <a href="https://mastodon.gyptazy.com/tags/x509" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>x509</span></a> <a href="https://mastodon.gyptazy.com/tags/certificates" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>certificates</span></a></p><p><a href="https://gyptazy.com/building-your-own-pki-with-step-ca-from-root-ca-to-proxmox-integration-with-acme/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">gyptazy.com/building-your-own-</span><span class="invisible">pki-with-step-ca-from-root-ca-to-proxmox-integration-with-acme/</span></a></p>
nico[lien] <a href="https://www.bortzmeyer.org/9799.html" rel="nofollow noopener" target="_blank">Blog Stéphane Bortzmeyer: RFC 9799: Automated Certificate Management Environment (ACME) Extensions for ".onion" Special-Use Domain Names</a> <a class="hashtag" href="https://social.tourmentine.com/tag/security" rel="nofollow noopener" target="_blank">#security</a> <a class="hashtag" href="https://social.tourmentine.com/tag/acme" rel="nofollow noopener" target="_blank">#acme</a> <a class="hashtag" href="https://social.tourmentine.com/tag/gik" rel="nofollow noopener" target="_blank">#gik</a> <a class="hashtag" href="https://social.tourmentine.com/tag/tls" rel="nofollow noopener" target="_blank">#tls</a> <a class="hashtag" href="https://social.tourmentine.com/tag/tor" rel="nofollow noopener" target="_blank">#tor</a> <a class="hashtag" href="https://social.tourmentine.com/tag/net" rel="nofollow noopener" target="_blank">#net</a> <a class="hashtag" href="https://social.tourmentine.com/tag/rfc" rel="nofollow noopener" target="_blank">#rfc</a>