They fixed it a bit ago.

  • felsiq@lemmy.zip
    link
    fedilink
    English
    arrow-up
    21
    ·
    3 days ago

    With LetsEncrypt phasing out expiry reminder emails, I’m expecting to see this shit more and more often soon

      • infeeeee@lemm.ee
        link
        fedilink
        arrow-up
        10
        ·
        edit-2
        3 days ago

        Because no one should rely on that, they recommend to fully automate renewal with a script or some other programs.

        • RogueBanana@lemmy.zip
          link
          fedilink
          English
          arrow-up
          5
          ·
          3 days ago

          What if there script is broken or not running properly? I would still want to be informed before I get a complaint from an user.

  • _____@lemm.ee
    link
    fedilink
    English
    arrow-up
    6
    ·
    edit-2
    3 days ago

    How do you all manage this ?

    They manually create certs at my job then manually move them other to a network drive and then a gpo? policy installs those certs to AD users.

    I found a way to automate this process (but company didn’t care)

    But I’m not an IT person, what’s the best approach for doing this on promises?

    edit: I like the responses but I was hoping for something that wouldn’t use 3rd party products. What if hypothetically the certificates were self signed and you wouldn’t need a 3rd party CA?

    Another thing is: is using 3rd party CAs really the most common way ?

    • Björn Tantau@swg-empire.de
      link
      fedilink
      arrow-up
      6
      ·
      edit-2
      3 days ago

      Luckily Let’s Encrypt made automation more popular. Every new domain of mine gets a cert that is renewed automatically. I don’t have to worry at all about it.

        • Tenkard@lemmy.ml
          link
          fedilink
          arrow-up
          2
          ·
          3 days ago

          I use caddy as reverse proxy and you have to do… Literally nothing. Point the domain at your server and write in the Caddyfile

          my.domain { reverse_proxy myservice:3000 }

          It also supports wildcard certificates for many domain services

    • Appoxo@lemmy.dbzer0.com
      link
      fedilink
      arrow-up
      2
      ·
      edit-2
      3 days ago

      For my personal setup at home: Traefik with LE

      I think at work my technical lead buys multi-year certs and manually imports them.

      Some clients of us use LE in some combination with another software.

      • nucleative@lemmy.world
        link
        fedilink
        English
        arrow-up
        1
        ·
        3 days ago

        I use a cronjob with cerbot to renew

        I also have Uptime Kuma setup to alert if certificates are getting close to expiration

  • 𝕸𝖔𝖘𝖘@infosec.pub
    link
    fedilink
    English
    arrow-up
    2
    ·
    edit-2
    2 days ago

    The address is store-images (dot) s-microsoft (dot) com. Is that Microsoft tld? If so, it sure looks like a phishy one to me…

    Edit: whois states is a Microsoft-registered domain. Wow. That’s… wow

    • irelephant [he/him]OPM
      link
      fedilink
      arrow-up
      2
      ·
      2 days ago

      Considering its the url used in the microsoft store, I’d assume it is.

      The name servers are also azure urls.