#Acme

2026-02-07

I've made Edwood understand Markdown. Toggles between rendered view and straight text, and supports direct editing in the markdown view, including **text** to bold, etc. Not perfect, but you have the escape hatch of looking at the text.
Certainly still buggy, but now my daily driver. Don't read the code, a machine wrote it and I've only lightly audited it.

Available at github.com/paul-lalonde/edwood

#plan9 #acme #edwood

A window of the Edwood acme clone with rich text support.  Shows an image of the Glenda bunny and some colored text and multi-sized text.
Doktor Overcomma :vepi:bobcromwell@dobbs.town
2026-02-07
Christian M. Grube 🐧Seraphyn@social.tchncs.de
2026-02-04

#traeffik @netcup #ACME companion

A lightweight Go application that automatically creates DNS records in Netcup when Docker containers with Traefik labels are started.

DNSSleep should be 600

#adminlife #opensource #netcup #dns
github.com/alex289/docker-trae

Sam at BLAGblag@typo.social
2026-02-03

Cal Callaghan’s ‘ACME and Web 2.0’ tells the story of how he salvaged and pieced together part of an Acme Beer ghost sign, including the sign painter’s signature.

callaghan.org/acme-web-2-0

Also check out these two Acme Beer labels in the online collections at @letterformarchive.

oa.letterformarchive.org/?dims

cc @ihazrabies

#Ghostsigns #Acme #Beer #SanFrancisco

Detail of weathered boards with hand-painted lettering on them. The upper most board has a small signature, "Ware", following the number 510 and a trade union insignia.
2026-02-03

Cloudflare fixes ACME Validation Bug allowing WAF Bypass to Origin Servers.

Cloudflare has addressed a security vulnerability impacting its Automatic Certificate Management Environment [ACME] validation logic that made it possible to bypass security controls and access origin servers.

⚠️"The vulnerability was rooted in how our edge network processed requests destined for the ACME HTTP-01 challenge path (/.well-known/acme-challenge/*)," the web infrastructure company's Hrushikesh Deshpande, Andrew Mitchell and Leland Garofalo said.⚠️

blog.cloudflare.com/acme-path-

#cloudflare #acme #path #vulnerability #it #security #privacy #engineer #media #infosec #tech #news

👾Kirill Firsov, founder and CEO of FearsOff, said the vulnerability could be exploited by a malicious user to obtain a deterministic, long‑lived token and access sensitive files on the origin server across all Cloudflare hosts, opening the door to reconnaissance.👾

<https://fearsoff.org/research/cloudflare-acme>

⁉️The vulnerability was addressed by Cloudflare on October 27, 2025, with a code change that serves the response and disables WAF features only when the request matches a valid ACME HTTP-01 challenge token for that hostname.⁉️[ImageSource: Shutterstock]

ACME is a communications protocol [RFC 8555] that facilitates automatic issuance, renewal, and revocation of SSL/TLS certificates. Every certificate provisioned to a website by a certificate authority [CA] is validated using challenges to prove domain ownership.

<https://www.rfc-editor.org/rfc/rfc8555>

👾This process is typically achieved using an ACME client like Certbot that proves domain ownership via an HTTP-01 [or DNS-01] challenge and manages the certificate lifecycle. The HTTP-01 challenge checks for a validation token and a key fingerprint located in the web server at "https://<YOUR_DOMAIN>/.well-known/acme-challenge/<TOKEN>" over HTTP port 80.👾

<https://letsencrypt.org/docs/client-options/>

<https://letsencrypt.org/docs/challenge-types/>

⁉️The CA's server makes an HTTP GET request to that exact URL to retrieve the file. Once the verification succeeds, the certificate is issued and the CA marks the ACME account [i.e., the registered entity on its server] as authorized to manage that specific domain.⁉️[ImageSource: Cloudflare]

In the event the challenge is used by a certificate order managed by Cloudflare, then Cloudflare will respond on the aforementioned path and provide the token provided by the CA to the caller. But if it does not correlate to a Cloudflare-managed order, the request is routed to the customer origin, which may be using a different system for domain validation.

👾In other words, the logic failed to verify whether the token in the request actually matched an active challenge for that specific hostname, effectively permitting an attacker to send arbitrary requests to the ACME path and circumvent WAF protections entirely, granting them the ability to reach the origin server.👾

"Previously, when Cloudflare was serving an HTTP-01 challenge token, if the path requested by the caller matched a token for an active challenge in our system, the logic serving an ACME challenge token would disable WAF features, since Cloudflare would be directly serving the response," the company explained.

⁉️"This is done because those features can interfere with the CA's ability to validate the token values and would cause failures with automated certificate orders and renewals. However, in the scenario that the token used was associated with a different zone and not directly managed by Cloudflare, the request would be allowed to proceed onto the customer origin without further processing by WAF rulesets."⁉️
Guillaume-Jean Herbietgjherbiet@mamot.fr
2026-02-03

Had a quick look a the community.crypto #Ansible collection documentation (ansible-collections.github.io/).
Interesting how this could be used to setup a small CA, or to handle #ACME certificates lifecycle purely in #Ansible.

Mike Harrisonmeuon@fosstodon.org
2026-02-03

Linode/Akamai for Acme.sh compat DNS?
Need to use LetEncrypt/acme.sh for a domain currently registered and DNS served by squarespace. Which does not have a useful API. Linode/Akamai does and already it's a Linode server anyway. Never used Linode/Akamai for DNS hosting... Anyone going to scream a reason not to? And yes, considered running my own DNS server for this, but... Do enough of that elsewhere to not want to do more. #dns #acme #letsencrypt

2026-02-02

Every server managing its own certificates made sense when you had three servers. But with web farms, load balancers, and VPN appliances, you end up with rsync cron jobs distributing certs everywhere. CertBot doesn't scale. Especially at 47-day lifetimes.

certkit.io/blog/servers-should

#ACME #PKI

2026-01-27

Несколько лет использовал #vim. Потом несколько лет использовал #emacs. Потом был очарован #9front ( #plan9 ) и пользовался #acme. Потом написал свой редактор #red (напоминающий #acme), Потом решил посмотреть, что там в мире творится. Глянул #neovim. Глянул #helix.... Запустил #emacs поставил helix-theme и залип.Похоже, из этой секты уже нет выхода... :(

2026-01-25

Автопродление TLS тоже ломается

Текст в ленте: Много лет индустрия информационной безопасности старается улучшить стандарты шифрования в сети двумя способами: массовое распространение HTTPS как общего стандарта шифрования для всех сайтов — даже для тех, которым защита формально не требуется. Очень много времени было потрачено на то, чтобы убедить пользователей в важности тотального шифрования абсолютно всех коммуникаций; сокращение сроков выдачи сертификатов SSL/TLS, чтобы стимулировать пользователей внедрять автоматические процедуры/скрипты для автопродления сертификатов, чтобы исключить «человеческий фактор» и забывчивость сисадминов, которые забывают менять сертификаты. Но иногда этого недостаточно. К сожалению, автоматические скрипты продления сертификатов тоже могут выйти из строя.

habr.com/ru/companies/globalsi

#tls #сертификат #acme #letsencrypt #шифрование #certbot #acmesh #dns #bazel

2026-01-24
🤔 Why only Europe? I’m looking for the same kind of service anywhere other than Let’s Encrypt’s country.

Wildcard or not, for me. :boost:

#selfHosting #tls #acme #sysadmin #askFedi #help #blambers
Stefan 'stelb' Le Breton 🇪🇺🇺🇦💚stelb
2026-01-23

not perfect, it's working for me. And I did not find a working solution for the new Hetzner "Cloud API"
github.com/stelb/truenas_acme_

Stefan 'stelb' Le Breton 🇪🇺🇺🇦💚stelb
2026-01-23

Ok next system with proper certificates at home: TrueNAS :)
Hetzner DNS is not directly supported, but a shell script creating the needed challenge txt records. Quick hack with hcloud cli, but it's working.

2026-01-20

With 47-day certificate lifetimes coming, you'll need to automate renewals. That usually means giving every system DNS credentials that can modify your entire zone.

CNAME delegation is better: point _acme-challenge to your cert provider once, they respond to challenges in their own zone. No credentials exposed, ever.

certkit.io/blog/delegated-dns-

#PKI #ACME

2026-01-20

🥳 Multiple major releases today

• @small-tech/auto-encrypt v5.0.0 (codeberg.org/small-tech/auto-e)
• @small-tech/auto-encrypt-localhost v10.0.0 (codeberg.org/small-tech/auto-e)
• @small-tech/https v6.0.0 (codeberg.org/small-tech/https/)

These releases bring short-lived certificates, IP Address (IPv4 and IPv6) support, and ACME Renewal Information (ARI) support to Auto Encrypt and @small-tech/https, implement a consistent asynchronous API across all three packages, and include loads of little fixes and code quality improvements.

This brings us very close to getting Web Numbers¹ support implemented natively in Kitten².

OCSP support is removed from Auto Encrypt and Windows support is dropped from all three packages as Microsoft is complicit in Israel’s genocide of the Palestinian people³ and Small Technology Foundation⁴ stands in solidarity with the Boycott, Divestment, and Sanctions (BDS) movement. Furthermore, Windows is an ad-infested and surveillance-ridden dumpster fire of an operating system and, alongside supporting genocide, you are putting both yourself and others at risk by using it.

Enjoy!

💕

🇵🇸 To support families facing genocide in Gaza, consider donating to them via Gaza Verified: gaza-verified.org/donate/

¹ ar.al/2025/06/25/web-numbers/
² kitten.small-web.org/
³ bdsmovement.net/microsoft
small-tech.org/

#SmallWeb #SmallTech #AutoEncrypt #AutoEncryptLocalhost #https #TLS #NodeJS #web #dev #ACME #LetsEncrypt #WebNumbers #Kitten #BDS #Palestine #Gaza #FreePalestine

PressMind Labspressmind
2026-01-20

Cloudflare łata błąd ACME – czy omijanie WAF stało się możliwe?

Czy krótka, nudna ścieżka do certyfikatów może stać się objazdem wokół całej zapory? Okazuje się, że tak – jeśli logika na brzegu sieci skręci w zły zjazd.

Czytaj dalej:
pressmind.org/cloudflare-lata-

Ilustracja przedstawiająca zaporę ogniową z neonowym szlakiem prowadzącym do niej.
:rss: Qiita - 人気の記事qiita@rss-mstdn.studiofreesia.com
2026-01-19
2026-01-18

"Short-lived and IP address certificates are now generally available from #letsencrypt These certificates are valid for 160 hours, just over six days. In order to get a short-lived certificate subscribers simply need to select the ‘shortlived’ certificate profile in their #ACME client."

"IP address certificates allow server operators to authenticate TLS connections to IP addresses rather than domain names.
...

IP address certificates must be short-lived certificates"

#tls #certificates

letsencrypt.org/2026/01/15/6da

Larvitz :fedora: :redhat:Larvitz@burningboard.net
2026-01-17

What a project. Did configure StepCA in my home-lab with a real physical HSM for the CA's private key. Using a SmartcardHSM (smartcard-hsm.com) from CardContact Systems.

Now I have acme (automated cert provisioning) working internally as long as the HSM is plugged into my server.

All running in an isolated FreeBSD 15-RELEASE jail (StepCA compiled from source with added PCSC-Lite support and usb device passed through by devfs rules).

Yay! It works!

#freebsd #stepca #devops #acme #certificates #tls #smartcard #hsm

2026-01-17

This is the kind of troubleshooting I'm not completely fond of - is the software lying? Did I miss any other option that would match cfweb.acme.profile? Is "renewal" a completely different code path that forgot about this option? #traefik #acme #troubleshooting

Screenshot of error messages:

docker compose logs:
traefik  | 2026-01-17T12:45:05Z ERR github.com/traefik/traefik/v3/pkg/provider/acme/provider.go:943 > Error renewing certificate from LE: {ip.was.here} error="acme: error: 400 :: POST :: https://acme-v02.api.letsencrypt.org/acme/new-order :: urn:ietf:params:acme:error:rejectedIdentifier :: Error creating new order :: Profile \"\" does not permit ip type identifiers" acmeCA=https://acme-v02.api.letsencrypt.org/directory providerName=cfweb.acme
traefik  | 2026-01-17T12:45:06Z ERR github.com/traefik/traefik/v3/pkg/provider/acme/provider.go:943 > Error renewing certificate from LE: {ip.was.here} error="acme: error: 400 :: POST :: https://acme-v02.api.letsencrypt.org/acme/new-order :: urn:ietf:params:acme:error:rejectedIdentifier :: Error creating new order :: Profile \"\" does not permit ip type identifiers" acmeCA=https://acme-v02.api.letsencrypt.org/directory providerName=cfweb.acme


docker-compose.yml:
      - "--certificatesresolvers.cfweb.acme.profile=shortlived"

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst