-
-
Notifications
You must be signed in to change notification settings - Fork 498
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
DietPi-LetsEncrypt | IPv6 support on Lighttpd with HTTPS #1840
Comments
@vwillcox Indeed DietPi is known to not handle IPv6 very greatly/reliable. @Fourdee does not have IPv6 at home do run needed test and I would need to set up a non-production device for testing. Hmm, have unused NanoPi K1 here, maybe I just found a job for it, as VirtualBox VMs seem to not work at all with IPv6 here. But let's see how exactly the network/interfaces are configures on your system:
The RPi seems to have network access, so this is already great. Ahh hmm, I think I found the issue. Ref: https://gist.github.com/cecilemuller/a26737699a7e70a7093d4dc115915de8
Then rerun certbot. |
|
Without the IPV6 line it is up and running and responds on IPv6 (http://nas.talktech.info) should take you to it |
Hmm, okay this seems to be deprecated then. http://nas.talktech.info => But I was also mistaken a bid:
@vwillcox To allow APT showing updates for this version, you would need some pin priority entries:
|
Hi, that has worked! I have a certificate. However now going to https://nas.talktech.info is not working.
|
|
@vwillcox I also failed to use the first suggested setting. Always get error that port 80 is already in use. Other guides suggest to add the following to enable IPv6, which worked: This syntax is used to add vhost settings within the braces. It seems So to enable IPv6 for HTTPS as well, you need to define As IPv6 is used more and more, I think we need to rework our webserver configs to allow both, or add/remove related settings when IPv6 is enabled/disabled via dietpi-config. Same for dietpi-letsencrypt. I hope the above allows you to configure your webserver accordingly, otherwise ask and I can provide exact steps to apply. |
Thank you very much @MichaIng all working now! https://nas.talktech.info. |
@vwillcox So am I right, that you actually just needed to change the |
@MichaIng that is correct. Working fine now and had lots of reports that others can now get to my testing site with https and the certificate is working! |
+ DietPi-LetsEncrypt | Disable deprecated TLS versions 1.0 and 1.1 on Lighttpd from Buster on. The Lighttpd v1.4.45, shipped with Debian Stretch, this is not possible yet. + DietPi-LetsEncrypt | Enable HTTPS for IPv6. It is added statically, which works fine as long as the kernel feature/module has not been disabled. But there are other cases where the disabled kernel feature causes issues, which is the reason we disable IPv6 only via sysctl. We can switch to dynamic IPv6 HTTPS, if we receive related reports from users, but those who manually disable the IPv6 kernel feature or blacklist the kernel module (where it is a module only) will likely know how to fix it themselves. This solves #1840.
Addressed with: #4220 It's added statically, which works still fine when IPv6 is disabled via dietpi.txt/dietpi-config/sysctl. But Lighttpd would fail if one manually blacklists the IPv6 kernel module or re-compiles the kernel with IPv6 disabled. Since that causes other issues and is not recommended, I think it's fine with Lighttpd, but we can switch to a dynamic way when receiving related reports. |
+ DietPi-LetsEncrypt | Add multi-domain support + DietPi-LetsEncrypt | Allow running Cerbot in standalone mode when no webserver was detected, e.g. when the certificate are required for other installed web applications + DietPi-LetsEncrypt | Detect installed webservers via their systemd unit, as this is what is required to correctly start/stop/restart it + DietPi-LetsEncrypt | Allow to toggle OCSP stapling + DietPi-LetsEncrypt | Do not start/stop/restart all services in general but only those where changes have been applied + DietPi-LetsEncrypt | Abandon the log file. It basically needs to be called interactively to do inputs, the automated run can only work if inputs have been done before and basically lost its purpose as its not used anymore for certificate renewals like years ago. + DietPi-LetsEncrypt | Do not store settings before anything has been changed or applied. If Cerbot is not executed, its better to load fresh (DietPi version based) defaults on next execution rather than the probably changed previously stored defaults. + DietPi-LetsEncrypt | Use exit codes when executing non-interactively + DietPi-LetsEncrypt | Do not show whiptail error prompt when Certbot fails, executed from menu. A "read -p" allows to review the console output and see the always printed "G_DIETPI-NOTIFY 2" error message. The whiptail, depending on terminal, can overwrite the Certbot output. Also do not try to show the exit code, as we do not store it anymore. + DietPi-LetsEncrypt | Disable deprecated TLS versions 1.0 and 1.1 on Lighttpd from Buster on. The Lighttpd v1.4.45, shipped with Debian Stretch, this is not possible yet. + DietPi-LetsEncrypt | Enable HTTPS for IPv6. It is added statically, which works fine as long as the kernel feature/module has not been disabled. But there are other cases where the disabled kernel feature causes issues, which is the reason we disable IPv6 only via sysctl. We can switch to dynamic IPv6 HTTPS, if we receive related reports from users, but those who manually disable the IPv6 kernel feature or blacklist the kernel module (where it is a module only) will likely know how to fix it themselves. This solves #1840.
Creating a bug report/issue:
Required Information:
Additional Information (if applicable):
dietpi-bugreport
ID | 7014414c-a92e-4297-a899-19fac8f9bc0aSteps to reproduce:
Expected behaviour:
Actual behaviour:
Extra details:
Connecting to my Raspberry pi over SSH with either IPv4 (internal only address) or IPv6 (external address) does not validate the certificate from certbot.
Failed authorization procedure. nas.validdomain.tld (http-01): urn:acme:error:connection :: The server could not connect to the client to verify the domain :: Fetching http://nas.talktech.info/.well-known/acme-challenge/qiYxllvcQV5mNOpP5NAMVDX2BdR-SECIgIVweSIuFX4: Error getting validation data
The text was updated successfully, but these errors were encountered: