Show Notes #602: Invasion of the Freedom Snatchers

Listen Now

Segment 2 (Amateur Radio)

  • Data transmitted via satellite may not be as secure as previously thought

Segment 3 (Open Source)

  • Postmortem of the Xubuntu Download Site Hack

Segment 4 (Linux in the Ham Shack)

Segment 5 (Announcements & Feedback)

  • Please Help Support the Show
    • Patreon
    • Paypal
    • Merch
    • YouTube!

Segment 6 (New Subscribers, New Supporters & Live Participants)

  • Free Patreons
    • Zach Winchester
  • Discord
    • FreqFox
    • N3PPH Bob
    • Tim
    • Williams Smith
    • Gary-KC5CMB
    • Eyros
    • Phil - VK6DEV
  • Bluesky
    • VA3WEB
  • Mailing List
    • Jerry Weiss
  • Live Chat
    • Darren, VK6EK
    • Mike, K6GTE

LHS Episode #601: Automated Certificates Deep Dive

Hello and welcome to Episode 601 of Linux in the Ham Shack. In this episode, the hosts discuss the RFC2136 for remote, authenticated DNS updates and how it can be used to automate an SSL certificate infrastructure with Let's Encrypt. We hope you enjoy this episode and have a great week coming up!

73 de The LHS Crew

Show Notes #601: Automated Certificates Deep Dive

Listen Now

Segment 1 (Deep Dive)

  • RFC 2136 Certificate Management
  • Topics
    • RFC 2136 defines the Domain Name System (DNS) Dynamic Update protocol, which allows authorized clients to remotely update DNS records on a managed server. This protocol is a standardized method for Dynamic DNS (DDNS), enabling things like automatic updates when a client's IP address changes. Many applications, such as BIND and Windows Server DNS, support RFC 2136, and it is frequently used for integrations with systems like DHCP or to automate services like TLS certificate validation with DNS challenges.
    • DNS
    • Configuring dynamic updates
    • Creating an update key with tsig-keygen
    • Including the key in named configuration
    • Allowing key-based zone updates
    • Certbot
    • Packages for rfc2136 support
    • certbot, python3-certbot, python3-certbot-dns-rfc2136
    • Automation (My Solution)
    • git (clone letsencrypt store)
    • Use SSH URI with ssh key authentication
    • Scripts (cron or systemd timer)
    • Replicate certificate store via git on servers that require it
    • Link certificates to store location
    • Restart services periodically (once weekly in my case)
    • Special Cases
    • VMware ESXi
    • Install keys in /etc/ssh/keys-${user}/authorized_keys
    • Script to push certs in ~${user} which pushes to /etc/vmware/ssl/rui.crt and /etc/vmware/ssl/rui.key and runs "/etc/init.d/hostd restart"
    • Proxmox VE
    • Put dns update key from DNS step above on Proxmox VE server in /usr/local/share/nsupdate.key
    • Configure Datacenter->ACME for use with ACME service.
    • Configure ${hostname}->Certificates to use ACME service with nsupdate plugin
    • Proxmox VE will automatically update and restart UI

Segment 2 (Announcements & Feedback)

  • Comment on Episode #597 from Mike, KG4VDK
    • Hey crew! Congrats on your 600th episode! I am very thankful you took the time to try out arcOS, and talk about it in depth in episode #597!  While listening to the episode, I won't lie, I was trying to telepathically (and retroactively) send an "RTFM" hint to help get over some of the hurdles that seemed to pop up. 🙂 Since Bill mentioned it a few times in #597, and again in #598, I'd like to address the topic of icons: arcOS is designed to be a tool used by different types of operators. Some of those operators may be brand new to amateur radio, Linux, or both. The simplified icon set for amateur radio software serves two purposes. First, the icons present a more coherent visual experience. Even within a family of applications (like FL-digi/amp/msg or the VARA modems), many of the factory icons are less than helpful in identifying the represented application. Beyond that issue, some of the included applications just don't have icons (ARDOP, Paracon, Pat). When trying to decide how to handle these two scenarios, I chose simplicity and legibility. If a user finds the supplied icons offensive, they can easily change them to something that suits their taste us[ing] a user module. I'll attach a few screenshots that show the differences, as well as a user module that sets the icons to "factory" (README included in the archive). Feel free to reach out with any other feedback you may have, especially if you stick with it for a while. 73 de KG4VDK, Mike.
  • Please Help Support the Show
    • Patreon
    • Paypal
    • Merchandise
    • YouTube

Segment 3 (New Subscribers, New Supporters & Live Participants)

  • Free Patreons
    • T
  • Discord
    • N3VMM
    • neif
    • RavenHollow
    • Wrench
    • Phil n2edx
    • Doug - KC5VKG
    • Bob - KA9MDP
    • John KB1EJQ
  • Mastodon
    • @WC3B
    • @ricodehond
    • @z3ro_burn
    • @jeromyokc

LHS Episode #600: The End?

Hello and welcome to the 600th episode of Linux in the Ham Shack. In this episode, the hosts discuss the podcast--past, present and future--and then talk about the world of artificial intelligence, including vibe coding, image and video generation, generative music, thoughts and cavets thereof, and much more. Thanks for listening and have a great week.

73 de The LHS Crew

LHS Episode #599: The Weekender CXXXV

It's time for The Weekender! This is our departure into the world of hedonism, random topic excursions, whimsy and (hopefully) knowledge. Thanks for listening and, if you happen to get a chance, feel free to call us or e-mail and send us some feedback. Tell us how we're doing. We'd love to hear from you.

73 de The LHS Crew