From 98f733893756ad1ad31b5e483b5cd731527f0a46 Mon Sep 17 00:00:00 2001 From: Daniel Roesler Date: Tue, 13 Mar 2018 07:26:41 -0700 Subject: renamed to acme-nosudo --- README.md | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/README.md b/README.md index 2e0e76e..de0a111 100644 --- a/README.md +++ b/README.md @@ -1,4 +1,4 @@ -# Let's Encrypt Without Sudo +# ACME Without Sudo The [Let's Encrypt](https://letsencrypt.org/) initiative is a fantastic program that offers **free** https certificates! However, the one catch is that you need @@ -12,7 +12,7 @@ have access to my private keys. I'd just like the free ssl certificate, please. So I made a script that does that. You generate your private key and certificate signing request (CSR) like normal, then run `sign_csr.py` with your CSR to get -it signed. The script goes through the [ACME protocol](https://github.com/letsencrypt/acme-spec) +it signed. The script goes through the [ACME protocol](https://github.com/ietf-wg-acme/acme/) with the Let's Encrypt certificate authority and outputs the signed certificate to stdout. @@ -297,7 +297,7 @@ server { ssl_prefer_server_ciphers on; location / { - return 200 'Let\'s Encrypt Example: https://github.com/diafygi/letsencrypt-nosudo'; + return 200 'Let\'s Encrypt Example: https://github.com/diafygi/acme-nosudo'; add_header Content-Type text/plain; } } @@ -404,7 +404,7 @@ After I released this script, Let's Encrypt added a manual authenticator to allow the Let's Encrypt client to not have to be run on your server. Hooray! However, the Let's Encrypt client still has access to your user account private keys, so please be aware of that. Anyway, check out the comment on issue -[#5](https://github.com/diafygi/letsencrypt-nosudo/issues/5#issuecomment-117283651) +[#5](https://github.com/diafygi/acme-nosudo/issues/5#issuecomment-117283651) to see how to use the manual authenticator in the official Let's Encrypt client. ``` -- cgit v1.2.3