-
-
Notifications
You must be signed in to change notification settings - Fork 14
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Some User had leaked the private key un-password protected in the internet, so our certificated had GlobalSign had revoke our cert. Re-issuing is pending. #18
Comments
The domain will still pointing to your localhost so your development work should be still working. just maybe some error message. HTTP will works as always. I am actively contacting GlobalSign to see if it is possible to whitelist our domain name. I will keep everyone posted here. |
We will use a short-term certificate at the moment. The good news is it can reduce our annual fee; the bad news is we need to renew the certificate every 3 months. If this issue continues, we might need to develop a new system to issue individual certificates to every user, but that means registration will become necessary, and I really don't want to. It will also incur development costs, and we might need your donation. |
oh my gosh really sorry for that, I do believe I am not only one who did that, but still want to write that, just to give you some feedback - project and idea are awesome, indeed helped a lot and from time to time, when https is required almost always it is easier to use localhost.direct rather than fight with cert-manager, let's encrypt, you name it and each time, personally I want to write some notes, so hopefully next time it will be easier, and notes are publicly available and indeed have keys my thinking was something like - ok, it is already publicly available, probably it should not be a problem but now I realize there are 3rd parties watching for this 🤔 BTW I do like how you have changed the password 💪 it should naturally fix the problem but from what I see inside last archine file names are little bit unusual, not a huge deal, but to just let you know (may be private key name should also be something like Once again sorry for messing with keys, and thank you for your idea and project |
https://crt.sh/?id=15227323293&opt=ocsp I believe it was revoked again (? |
I believe so.... |
Then you can go the last step further: set up an ACME service like Lets Encrypt did, let the owners of the mail address create the private(!) key themselves and have them obtain their certificate via ACME. |
I am currently maintaining 5 sets of cert bundles, and assigning users to groups, so if one user does anything wrong, at least only the user in the same group will be affected. Donators will have the individual cert bundles so they will never be revoked by others’ fault. |
Crappy replacement: Get a free 90-day Wildcard SSL from Let For example: https://sslfree.io/index.html (DNS check through TXT record) If you know any other free wildcard services or acme-scripts - share please :) |
@vadym-dudar In fact, I totally agree with you. I personally don't think it’s difficult to obtain a public CA cert by yourself. I am using cert bot to automate Cert issuing as well. |
Originally localhost.direct is using one year long wildcard cert, but it seems not feasible to do so anymore, at least at the moment. I don't know, just trying my best. |
Not everyone are experts, think of some frontend/ios/android developers for example, who are forced to have https to test some oidc flows or something like that - should they really jump into this rabbit hole 🤔 Projects like this must exist, they help a lot for many people BTW: not sure if that helps, in work projects, we have dedicated github action that does create lets encryp certs by schedule every month and just pushes them to repository, under the hood, certs are verified via cloudflare api, so there is no need to have dedicated server/deployment, and as a result teammates know where they can find fresh certs not perfect, not saying it worth looking, but may be will give some ideas, here is the snippet ssl.ymlname: ssl
on:
schedule:
- cron: 0 8 1 * *
workflow_dispatch:
env:
CLOUDFLARE_API_TOKEN: ${{ secrets.CLOUDFLARE_API_TOKEN }}
jobs:
ssl:
timeout-minutes: 60
runs-on: ubuntu-latest
strategy:
matrix:
domain:
# domains that have 127.0.0.1 A record
- local.example.com
- local.dev.example.com
steps:
- uses: actions/checkout@v3
- name: cloudflare
working-directory: ssl
run: echo "dns_cloudflare_api_token = $CLOUDFLARE_API_TOKEN" > cloudflare.ini
- name: certbot
working-directory: ssl
run: |
docker run --rm \
-v $PWD/cloudflare.ini:/cloudflare.ini \
-v $PWD/letsencrypt:/etc/letsencrypt \
certbot/dns-cloudflare certonly \
--non-interactive \
--domains ${{ matrix.domain }} \
--dns-cloudflare \
--dns-cloudflare-credentials /cloudflare.ini \
--dns-cloudflare-propagation-seconds 60 \
--agree-tos \
--manual-public-ip-logging-ok \
--preferred-challenges dns \
-m [email protected]
- name: chown
working-directory: ssl
# whoami - uid=1001 gid=121, user: runner, group: docker
run: sudo chown -R 1001:121 letsencrypt
- name: mv
working-directory: ssl
run: |
mv letsencrypt/archive/${{ matrix.domain }}/fullchain1.pem ${{ matrix.domain }}.crt
mv letsencrypt/archive/${{ matrix.domain }}/privkey1.pem ${{ matrix.domain }}.key
# will store certs as built artifacts, commit part is removed to keep example small
- name: artifacts
uses: actions/upload-artifact@v4
with:
name: ${{ matrix.domain }}
path: ssl/${{ matrix.domain }}.* |
@mac2000 That's really nice. Let me have a look at this. Currently, I am trying to use a Linux VPS to do the auto-cert bot and deploy to the download server. Let me see if GitHub Actions can make it smoother. thxxx. |
hmmm, I think we found (one of) the reason why the key leaked.....lol |
We are now reissuing the General Certificate Bundle without registration. However, we also offer the Cert Bundle by request and the Cert Bundle by Sponsorship for users who prefer not to share the certificate bundle with a large number of users. Let’s consider this issue closed for now. |
Please do not store the private key in any un-password protected place which can access in the internet.
The text was updated successfully, but these errors were encountered: