From nobody Sun Apr 21 02:43:38 2024 X-Original-To: freebsd-questions@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4VMXkh4y29z5HDT9 for ; Sun, 21 Apr 2024 02:43:40 +0000 (UTC) (envelope-from johnl@iecc.com) Received: from gal.iecc.com (gal.iecc.com [IPv6:2001:470:1f07:1126:0:43:6f73:7461]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "gal.iecc.com", Issuer "Let's Encrypt Authority X3" (not verified)) by mx1.freebsd.org (Postfix) with ESMTPS id 4VMXkh2fVGz46l3 for ; Sun, 21 Apr 2024 02:43:40 +0000 (UTC) (envelope-from johnl@iecc.com) Authentication-Results: mx1.freebsd.org; none Received: (qmail 61012 invoked from network); 21 Apr 2024 02:43:39 -0000 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed; d=iecc.com; h=date:message-id:from:to:cc:subject:in-reply-to:mime-version:content-type:content-transfer-encoding:cleverness; s=ee4a66247d5b.k2404; bh=3jLCYGYzQn6C20cSPM+kTzUNMhYs9jbeDEt5FvmJHNg=; b=Hg/NTux902gyJIcTYMQt7Kh0HQWlCdLqRxM5/C8F2Q6RTLeBEAcaHBM01YuFvHYp+4obtAU5MW+UyCOFJ4N/WQoMWdT2hAt2U3GKCYoM9mN7ShjpfgkRFh8y5C88z9OBp7ecm9p4Es3RZ0c+nPgbRKvQ+kVtlZh3eGZPEIs9gbs15UJPRYbWr/8e0WNG226V5AKSI3rWhgRqT53KFKLYduAopjn7JWskAj9UjFxSH1v2OBvQo54PadBJfZO/ATUH/BY2OYFAyBoRjxA4wbrqoeGD4+aw+HwAnNUMBH/g37VxYdv68T0kaZuqNb5f5+J2eJ4D9H5/00310Dg24RCa7A== Received: from ary.qy ([IPv6:2001:470:1f07:1126::78:696d:6170]) by imap.iecc.com ([IPv6:2001:470:1f07:1126::78:696d:6170]) with ESMTPS (TLS1.3 ECDHE-RSA CHACHA20-POLY1305 AEAD) via TCP6; 21 Apr 2024 02:43:38 -0000 Received: by ary.qy (Postfix, from userid 501) id 4F7E5891631C; Sat, 20 Apr 2024 22:43:38 -0400 (EDT) Date: 20 Apr 2024 22:43:38 -0400 Message-Id: <20240421024338.4F7E5891631C@ary.qy> From: "John Levine" To: freebsd-questions@freebsd.org Cc: paulbeard@gmail.com Subject: Re: certbot In-Reply-To: Organization: Taughannock Networks X-Headerized: yes Cleverness: minimal List-Id: User questions List-Archive: https://lists.freebsd.org/archives/freebsd-questions List-Help: List-Post: List-Subscribe: List-Unsubscribe: X-BeenThere: freebsd-questions@freebsd.org Sender: owner-freebsd-questions@FreeBSD.org Mime-Version: 1.0 Content-type: text/plain; charset=utf-8 Content-transfer-encoding: 8bit X-Spamd-Bar: ---- X-Rspamd-Pre-Result: action=no action; module=replies; Message is reply to one we originated X-Spamd-Result: default: False [-4.00 / 15.00]; REPLY(-4.00)[]; ASN(0.00)[asn:6939, ipnet:2001:470::/32, country:US] X-Rspamd-Queue-Id: 4VMXkh2fVGz46l3 It appears that paul beard said: >-=-=-=-=-=- > >The meta question for me and perhaps others running FreeBSD 13 is what >changed and how do we prepare for it if we expect to run certbot in FreeBSD >14? I run it as I always have, since release 11 or so. > >00 00 * * Sun python -c 'import random; import time; >time.sleep(random.random() * 3600)' && /usr/local/bin/certbot renew >--renew-hook 'service nginx reload' > >Will I need to change that? Do the folks at EFF know/have they documented >what changed and how to manage it? I don't see any reason that won't work, but there are much easier ways to do a random sleep up to an hour, e.g. 00 00 * * Sun sleep $(jot -r 1 1 3600); certbot renew --renew-hook 'service nginx reload'