• 0 Posts
  • 5 Comments
Joined 2 years ago
cake
Cake day: June 5th, 2023

help-circle
  • Just did a quick test, the certs do not bind to the port, only the domain/fqdn. So in short your reverse proxy/application is doing something wrong. Do you have the cert files? Can you test them inside a ubuntu:24.04 docker with the script bellow? (you’ll need to copy two cert files). That does TLS and is the application all in one script, but it could be two scripts one acting as the reverse proxy or whatever, doesn’t make a difference from the point of view of the client.

    Lets Encrypt doesn’t do anything in port 80/443 unless you’re using the http challlenge AFAIK. And once you have the certs, they aren’t really involved in the connection, thus that can’t be the issue. Test by using curl against the script below, or your own infrastructure (each step/chain of it, the reverse proxy, the application ip, etc.)

    But in short I think your reverse proxy configuration is just wrong, or you’re accessing it the wrong way on the client side. For example, using https://example.com/ instead of https://example.com:5050/.

    # docker run --rm --net host -it ubuntu:24.04
    # then install python3 and run this
    import http.server
    import ssl
    
    PORT = 5201  # Change to your desired port
    CERT_FILE = "/fullchain.pem"  # Path to your certificate file
    KEY_FILE = "/key.pem"    # Path to your private key file
    
    # Create a basic HTTP request handler
    class SimpleHTTPRequestHandler(http.server.SimpleHTTPRequestHandler):
        def do_GET(self):
            self.send_response(200)
            self.send_header("Content-type", "text/html")
            self.end_headers()
            self.wfile.write(b"<h1>Welcome to the secure static server!</h1>")
    
    # Set up the HTTP server
    httpd = http.server.HTTPServer(("0.0.0.0", PORT), SimpleHTTPRequestHandler)
    
    # Set up SSL context
    ssl_context = ssl.SSLContext(ssl.PROTOCOL_TLS_SERVER)
    ssl_context.load_cert_chain(certfile=CERT_FILE, keyfile=KEY_FILE)
    
    # Wrap the server socket with SSL
    httpd.socket = ssl_context.wrap_socket(httpd.socket, server_side=True)
    
    print(f"Serving HTTPS on port {PORT}")
    httpd.serve_forever()
    

  • First and foremost, you are outright dismissing Flatpak, which accomplishes all of your goals pretty much, with a vague desire to use “plain old Linux” instead of a proper motivation. You should really stop and ask yourself, WHY not Flatpak? What do you actually want, and why is Flatpak not the answer to that?

    I point this out first because then in the next paragraph you mention some tools such as Firejail. Which is attempting to do more or less the same as flatpak, but in a more crude/less polished form. And neither Flatpak or Firejail are “plain linux”, they’re just fancy wrappers around a whole bunch of actual “Linux features”, like namespaces, seccomp, cgroups, users, chroot, filesystem permissions, and other higher-level tools such as bubblewrap (in the case of flatpak).

    So, do you want to learn the underlying primitives/underlying tooling? If so, start with users, filesystem permissions, and Linux namespaces and the other Linux features I’ve listed.

    Or do you want to just deploy applications in a sandboxed environment? If so, use Flatpak/Firejail/Snap/Linux containers such as Podman or Docker, etc. Then manage permissions using Flatseal (in the case of flatpak), and you’re done.

    How should I do this? I need some sources to read all about linux user accounts.

    You should stick with trusted sources such as TLDP, Redhat/Fedora docs, Archlinux Wiki, Gentoo Wiki, etc. For example, regarding users:




  • E-mail is horrible for privacy, spam, instant messaging, etc. PGP “works” in very limited scenarios, and e-mail is not really one of them.

    Plus these two statements seem unplausible for me:

    we can assume you’re protected by PGP when writing to most users,

    and

    and with the added effect of not needing to convince anyone to install anything since from their end it’s just an email.

    I disagree with the first statement, most users don’t know what PGP is and therefore don’t have keys, so you can’t encrypt anything to them. The only way most users would use PGP is if something sets it up for them, alá protonmail or my using some special client. Since you’ve said that from their end it is just an e-mail, how does Deltachat add any meaningful encryption?