this post was submitted on 10 May 2025
190 points (100.0% liked)

iiiiiiitttttttttttt

695 readers
600 users here now

you know the computer thing is it plugged in?

A community for memes and posts about tech and IT related rage.

founded 3 weeks ago
MODERATORS
 

They fixed it a bit ago.

top 23 comments
sorted by: hot top controversial new old
[–] [email protected] 23 points 6 days ago (1 children)

With LetsEncrypt phasing out expiry reminder emails, I’m expecting to see this shit more and more often soon

[–] PokerChips 7 points 6 days ago (2 children)

Why would they phase that out?

[–] [email protected] 12 points 5 days ago

Because it's not very useful, very replacable, requires them to keep email addresses, and it's costing them extra resources for the free service they provide.

See their announcement

[–] [email protected] 12 points 6 days ago* (last edited 5 days ago) (1 children)

Because no one should rely on that, they recommend to fully automate renewal with a script or some other programs.

[–] [email protected] 5 points 6 days ago (1 children)

What if there script is broken or not running properly? I would still want to be informed before I get a complaint from an user.

[–] [email protected] 8 points 6 days ago

Then set-up a fucking Monitoring service. Not their problem

[–] [email protected] 29 points 6 days ago

Manjaro: "First time?"

[–] [email protected] 12 points 6 days ago (1 children)

Must be a lot of vibe in the code over there these days.

[–] irelephant 5 points 6 days ago (1 children)
[–] andybytes 2 points 10 hours ago

That's true I read that hahah

[–] [email protected] 6 points 6 days ago* (last edited 6 days ago) (2 children)

How do you all manage this ?

They manually create certs at my job then manually move them other to a network drive and then a gpo? policy installs those certs to AD users.

I found a way to automate this process (but company didn't care)

But I'm not an IT person, what's the best approach for doing this on promises?

edit: I like the responses but I was hoping for something that wouldn't use 3rd party products. What if hypothetically the certificates were self signed and you wouldn't need a 3rd party CA?

Another thing is: is using 3rd party CAs really the most common way ?

[–] [email protected] 7 points 6 days ago* (last edited 6 days ago) (1 children)

Luckily Let's Encrypt made automation more popular. Every new domain of mine gets a cert that is renewed automatically. I don't have to worry at all about it.

[–] [email protected] 3 points 6 days ago (2 children)

How do you manage automatic renewal?

[–] [email protected] 3 points 6 days ago

A cronjob calling Let's Encrypt's tool. I think it's called certbot.

[–] [email protected] 2 points 6 days ago

I use caddy as reverse proxy and you have to do... Literally nothing. Point the domain at your server and write in the Caddyfile

my.domain { reverse_proxy myservice:3000 }

It also supports wildcard certificates for many domain services

[–] [email protected] 2 points 6 days ago* (last edited 6 days ago) (1 children)

For my personal setup at home: Traefik with LE

I think at work my technical lead buys multi-year certs and manually imports them.

Some clients of us use LE in some combination with another software.

[–] [email protected] 1 points 6 days ago

I use a cronjob with cerbot to renew

I also have Uptime Kuma setup to alert if certificates are getting close to expiration

[–] [email protected] 4 points 6 days ago

They got that vibe

[–] [email protected] 3 points 6 days ago
[–] [email protected] 2 points 5 days ago* (last edited 5 days ago) (1 children)

The address is store-images (dot) s-microsoft (dot) com. Is that Microsoft tld? If so, it sure looks like a phishy one to me...

Edit: whois states is a Microsoft-registered domain. Wow. That's..... wow

[–] irelephant 2 points 5 days ago (1 children)

Considering its the url used in the microsoft store, I'd assume it is.

The name servers are also azure urls.

[–] [email protected] 1 points 5 days ago

That doesn't mean you don't have a browser hijacker malware, though, so I always check destination urls.

[–] [email protected] 1 points 6 days ago

IT? More like UT; Urrr Technology