acm - Dave's Blog

Search
My timeline on Mastodon

Let's Encrypt NearlyFreeSpeech.net Update

2016 Nov 5, 8:59

Since I had last posted about using Let's Encrypt with NearlyFreeSpeech, NFS has changed their process for setting TLS info. Instead of putting the various files in /home/protected/ssl and submitting an assistance request, now there is a command to submit the certificate info and a webpage for submitting the certificate info.

The webpage is https://members.nearlyfreespeech.net/{username}/sites/{sitename}/add_tls and has a textbox for you to paste in all the cert info in PEM form into the textbox. The domain key, the domain certificate, and the Let's Encrypt intermediate cert must be pasted into the textbox and submitted.

Alternatively, that same info may be provided as standard input to nfsn -i set-tls

To renew my certificate with the updated NFS process I followed the commands from Andrei Damian-Fekete's script which depends on acme_tiny.py:

python acme_tiny.py --account-key account.key --csr domain.csr --acme-dir /home/public/.well-known/acme-challenge/ > signed.crt
wget -O - https://letsencrypt.org/certs/lets-encrypt-x3-cross-signed.pem > intermediate.pem
cat domain.key signed.crt intermediate.pem > chained.pem
nfsn -i set-tls < chained.pem
Because my certificate had already expired I needed to comment out the section in acme_tiny.py that validates the challenge file. The filenames in the above map to the following:
  • signed.crt is the Let's Encrypt provided certificate
  • account.key is the user private key registered with LE
  • domain.csr is the cert request
  • domain.key is the key for the domain cert
PermalinkCommentscertificate lets-encrypt nearlyfreespeech.net

SIGGRAPH 2013 : Technical Papers Preview Trailer (by...

2013 May 24, 4:46


SIGGRAPH 2013 : Technical Papers Preview Trailer (by ACMSIGGRAPH)

PermalinkCommentstechnical video cgi

Fast hashing of variable-length text strings

2008 Jul 3, 10:12"Fast hashing of variable-length text strings", from Source Communications of the ACM archive Volume 33 , Issue 6 (June 1990) Pages: 677 - 680, Year of Publication: 1990, Author Peter K. Pearson, Lawrence Livermore National Lab, Livermore, CAPermalinkCommentshash programming acm reference

Say No To Drugs: Pac-Man, Explained

2008 May 4, 9:13An explaination of the story behind Pac-Man.PermalinkCommentsvia:ethan_t_hein videogame humor pacman art

Retro Sabotage: Highwaymen On Memory Lane - Flash Games [ver.9.0 req.]

2008 Mar 23, 3:26Flash versions of retro games with humorous differences.PermalinkCommentsgame humor retro games flash web internet pacman space-invaders tetris via:boingboing

Go To Statement Considered Harmful

2006 Dec 7, 1:15Dijkstra's famous anti-goto paper. I agree with him. Due to goto in BASIC through 3rd and 4th grade I thought goto was a word.PermalinkCommentsarticle history humor language goto code programming dijkstra acm read

My New IE Blog Entry

2006 Dec 6, 6:18I got another blog entry on the IE Blog! I wrote about file URIs in IE. Lots of fun right? Woo for file URIs! I added the post to del.icio.us and saw that it had already been added 6 times previous. This compared to my previous IE Blog post which was added to del.icio.us a total of 1 time(s) by y.t. I guess people are more interested in blog posts that have 'URI' in the title than they are about blog posts whose title references Dijkstra. Coming soon (or later) to the IE Blog: a post on international mailto URIs. Hooray!PermalinkCommentsblog ie7 file uri delicious

John Resig - Javascript Diff Algorithm

2006 Nov 6, 4:50A Javascript lib that does diff for you. Could be useful in implementing cool AJAX-y clientside things. Also has link to ACM paper describing the diff algorithm used.PermalinkCommentsacm ajax algorithm article blog code development diff javascript library programming reference

We Have the Information You Want, But Getting It Will Cost You: Being Held Hostage by Information Overload

2006 Apr 18, 12:44ACM Article by Mark R. Nelson concerning increase in information. "We Have the Information You Want, But Getting It Will Cost You: Being Held Hostage by Information Overload"PermalinkCommentsacm information info information-overload article anxiety

Reflections on Trusting Trust

2005 Dec 29, 3:09PermalinkCommentssecurity unix history development hack acm ken-thompson trust

Lazy

2003 Mar 8, 8:15Finals week is closing in quickly. This quarter seemed to go by faster than usual. With the end of the quarter almost here I've got a variety of assignments to finish. Today is supposed to be the day I work on them all, but I'm easily distracted. For instance, I had read Ken Thompson's Reflections on Trusting Trust a few days ago. As the author suggested, I tried writing my own self-reproducing program. Rather than brevity, I went for clarity and good style. That was my intent anyway. Now I'm avoiding work by writing in this journal. Last night I lost my money fairly early on during poker. After that Scott gave me a dollar which, surprisingly, lasted me much longer than the previous five. Though despite that, It was a good time.PermalinkComments
Older Entries Creative Commons License Some rights reserved.