Let's Encrypt
Leif Pedersen
leif at ofwilsoncreek.com
Sun Oct 13 17:53:14 UTC 2019
On Sat, Oct 12, 2019 at 6:28 PM Garrett Wollman <wollman at bimajority.org>
wrote:
> <<On Tue, 10 Sep 2019 07:52:31 +0700, Victor Sudakov <vas at mpeks.tomsk.su>
> said:
>
> > Trond Endrestøl wrote:
> >>
> >> #minute hour mday month wday who command
> >>
> >> 52 4 1 * * root certbot renew --quiet
> --pre-hook "service apache24 stop" --post-hook "service apache24 start"
> >> 52 1 15 * * root certbot renew --quiet
> --pre-hook "service apache24 stop" --post-hook "service apache24 start"
>
> > Is it safe to run certbot as root?
>
> I can't speak to certbot (I currently use acmetool) but in general,
> the thing that certbot does requires the ability to signal whatever
> process is using the certificates, which is normally going to be a web
> server but might be a mail server, name server, RADIUS server, or some
> other application -- as shown in the example above. So if you don't
> run it as root (probably smart) you'll need to find another way to
> tell the TLS server application to reload its certificates when
> needed.
>
> -GAWollman
>
A good point. One option might be to run two cron jobs. One job would run
certbot as an unprivileged user, and the other would run "service apache24
restart" as root an hour or so later. (Or maybe reload is enough.)
More information about the freebsd-security
mailing list