"Let’s Encrypt is a new Certificate Authority: It’s free, automated, and open."[1]
The idea would be to integrate the openSUSE/SLE support into the Let's Encrypt Client.
"The Let's Encrypt Client is a tool to automatically receive and install X.509 certificates to
enable TLS on servers. The client will interoperate with the Let's Encrypt CA which will be
issuing browser-trusted certificates for free."[2]
Let's Encrypt uses the Automated Certificate Management Environment (ACME) protocol[3]
to distribute certificates easily. Part of this project idea would be to understand the protocol
in detail.
From the Let's Encrypt blog[4]:
Nov 12, 2015
Public Beta: December 3, 2015
Let’s Encrypt will enter Public Beta on December 3rd, 2015. Once
we’ve entered Public Beta our systems will be open to anyone who
would like to request a certificate.
Looking for hackers with the skills:
This project is part of:
Hack Week 13
Activity
Comments
-
about 9 years ago by Jedibeeftrix | Reply
this would be an immensely valuable project for leap users. setting up an owncloud (or similar) server is trivial. enabling https is an ugly and painful process right now. this would help greatly.
-
about 9 years ago by bmwiedemann | Reply
I had good success with https://github.com/diafygi/acme-tiny and my helper /suse/bwiedemann/Export/contrib/Makefile
-
about 7 years ago by dmolkentin | Reply
It's done. SLE/openSUSE 15 will have letsencrypt support through dehydrated, a client that comes with less baggage than the official one, as well as a bunch of useful enabler scripts.
Similar Projects
Kanidm: A safe and modern IDM system by firstyear
Kanidm is an IDM system written in Rust for modern systems authentication. The github repo has a detailed "getting started" on the readme.
In addition Kanidm has spawn a number of adjacent projects in the Rust ecosystem such as LDAP, Kerberos, Webauthn, and cryptography libraries.
In this hack week, we'll be working on Quokca, a certificate authority that supports PKCS11/TPM storage of keys, issuance of PIV certificates, and ACME without the feature gatekeeping implemented by other CA's like smallstep.
For anyone who wants to participate in Kanidm, we have documentation and developer guides which can help.
I'm happy to help and share more, so please get in touch!
Kanidm: A safe and modern IDM system by firstyear
Kanidm is an IDM system written in Rust for modern systems authentication. The github repo has a detailed "getting started" on the readme.
In addition Kanidm has spawn a number of adjacent projects in the Rust ecosystem such as LDAP, Kerberos, Webauthn, and cryptography libraries.
In this hack week, we'll be working on Quokca, a certificate authority that supports PKCS11/TPM storage of keys, issuance of PIV certificates, and ACME without the feature gatekeeping implemented by other CA's like smallstep.
For anyone who wants to participate in Kanidm, we have documentation and developer guides which can help.
I'm happy to help and share more, so please get in touch!
Hack on libstrophe by sjaeckel
Description
libstrophe has some open PR's and issues that I'd like to work on and finalize.
Since libstrophe is also targeted for embedded devices, it would make sense to have support for mbedTLS.
Also I've recently discovered rustls as TLS library. If time allows I'd like to integrate that into libstrophe.
Goals
- Merge most open PRs
Maybe
- Add mbedTLS as TLS provider
- Add rustls as TLS provider
Resources
https://github.com/strophe/libstrophe
https://github.com/rustls/rustls