|
|
|
@ -1,7 +1,7 @@
|
|
|
|
|
---
|
|
|
|
|
title: OpenBSD
|
|
|
|
|
date: 2023-11-29T20:33:48+0100
|
|
|
|
|
lastmod: 2024-01-26T11:16:40+0000
|
|
|
|
|
lastmod: 2024-02-02T16:10:23+0000
|
|
|
|
|
tags:
|
|
|
|
|
- openbsd
|
|
|
|
|
- python
|
|
|
|
@ -77,7 +77,7 @@ $ doas certbot certonly --manual --manual-public-ip-logging-ok \
|
|
|
|
|
-d "*.oe7drt.com" -d "*.oe7drt.net" -d oe7drt.com -d oe7drt.net
|
|
|
|
|
~~~
|
|
|
|
|
|
|
|
|
|
Some changes to the apache2 configuration was made:
|
|
|
|
|
Some changes to the apache2 configuration were made:
|
|
|
|
|
|
|
|
|
|
~~~apache
|
|
|
|
|
<MDomain oe7drt.com oe7drt.net>
|
|
|
|
@ -106,7 +106,7 @@ The binary (`dns-challenge.phar`) that actually does the DNS Challenge is taken
|
|
|
|
|
[kategray/dns-challenge-cloudflare](https://github.com/kategray/dns-challenge-cloudflare).
|
|
|
|
|
|
|
|
|
|
An **easier way** to obtain wildcard certificates would be the use of **Cloudflares proxy**.
|
|
|
|
|
They would also create another wildcard cert of another issuer in case the first one
|
|
|
|
|
They would also create a second wildcard cert of another issuer in case the first one
|
|
|
|
|
would get compromised so they would actually replace your main cert with a backup cert
|
|
|
|
|
just with a whoooop.
|
|
|
|
|
|
|
|
|
|