{"id":178,"date":"2017-01-04T10:10:56","date_gmt":"2017-01-04T15:10:56","guid":{"rendered":"http:\/\/www.k2dls.net\/blog\/?p=178"},"modified":"2017-01-04T10:10:56","modified_gmt":"2017-01-04T15:10:56","slug":"installing-certbot-on-raspbian-jessie","status":"publish","type":"post","link":"https:\/\/www.k2ie.net\/blog\/2017\/01\/04\/installing-certbot-on-raspbian-jessie\/","title":{"rendered":"Installing Certbot on Raspbian Jessie"},"content":{"rendered":"<p>I wanted to install the <a href=\"https:\/\/letsencrypt.org\/\">Let&#8217;s Encrypt<\/a> <a href=\"https:\/\/certbot.eff.org\/\">certbot<\/a> package on a <a href=\"https:\/\/www.raspbian.org\/\">Raspbian<\/a> Jessie installation that hosts my <a href=\"http:\/\/www.asterisk.org\/\">Asterisk PBX<\/a>.  I had manually installed a certificate but decided that the automated certificate installation is advantageous.  Certbot is available as a <a href=\"https:\/\/backports.debian.org\/\">backport<\/a>.<\/p>\n<p>Step 1 &#8212; Add the backport source location:<\/p>\n<p>          <code># echo \"deb http:\/\/ftp.debian.org\/debian jessie-backports main\" \\<br \/>\n                  > \/etc\/apt\/sources.list.d\/backports.list<\/code><\/p>\n<p>Step 2 &#8212; <code># apt-get update<\/code><\/p>\n<p>I received the following error:<\/p>\n<p>W: GPG error: http:\/\/ftp.debian.org jessie-backports InRelease: The following signatures couldn&#8217;t be verified because the public key is not available: NO_PUBKEY <strong>8B48AD6246925553<\/strong> NO_PUBKEY <strong>7638D0442B90D010<\/strong><\/p>\n<p>Step 3 &#8212; The two bolded keys needed to be added to the gpg keyring:<\/p>\n<p><code># gpg --keyserver pgpkeys.mit.edu --recv-key 8B48AD6246925553<\/code><br \/>\ngpg: requesting key 46925553 from hkp server pgpkeys.mit.edu<br \/>\ngpg: key 46925553: public key &#8220;Debian Archive Automatic Signing Key (7.0\/wheezy) <ftpmaster@debian.org>&#8221; imported<br \/>\ngpg: no ultimately trusted keys found<br \/>\ngpg: Total number processed: 1<br \/>\ngpg:               imported: 1  (RSA: 1)<\/p>\n<p><code># gpg -a --export 8B48AD6246925553 | sudo apt-key add -<\/code><br \/>\nOK<\/p>\n<p><code># gpg --keyserver pgpkeys.mit.edu --recv-key 7638D0442B90D010<\/code><br \/>\ngpg: requesting key 2B90D010 from hkp server pgpkeys.mit.edu<br \/>\ngpg: key 2B90D010: public key &#8220;Debian Archive Automatic Signing Key (8\/jessie) <ftpmaster@debian.org>&#8221; imported<br \/>\ngpg: no ultimately trusted keys found<br \/>\ngpg: Total number processed: 1<br \/>\ngpg:               imported: 1  (RSA: 1)<\/p>\n<p><code># gpg -a --export 7638D0442B90D010 | sudo apt-key add -<\/code><br \/>\nOK<\/p>\n<p>Step 4 &#8212; Update the package list:<\/p>\n<p>          <code># apt-get update<\/code><\/p>\n<p>Step 5 &#8212; Install the backported package:<\/p>\n<p>          <code># apt-get install certbot -t jessie-backports<\/code><\/p>\n","protected":false},"excerpt":{"rendered":"<p>I wanted to install the Let&#8217;s Encrypt certbot package on a Raspbian Jessie installation that hosts my Asterisk PBX. I had manually installed a certificate but decided that the automated certificate installation is advantageous. Certbot is available as a backport. Step 1 &#8212; Add the backport source location: # echo &#8220;deb http:\/\/ftp.debian.org\/debian jessie-backports main&#8221; \\ &hellip; <a href=\"https:\/\/www.k2ie.net\/blog\/2017\/01\/04\/installing-certbot-on-raspbian-jessie\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Installing Certbot on Raspbian Jessie&#8221;<\/span><\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7,6],"tags":[11,10,12],"class_list":["post-178","post","type-post","status-publish","format-standard","hentry","category-infosec","category-technology","tag-certbot","tag-lets-encrypt","tag-raspbian"],"_links":{"self":[{"href":"https:\/\/www.k2ie.net\/blog\/wp-json\/wp\/v2\/posts\/178","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.k2ie.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.k2ie.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.k2ie.net\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.k2ie.net\/blog\/wp-json\/wp\/v2\/comments?post=178"}],"version-history":[{"count":12,"href":"https:\/\/www.k2ie.net\/blog\/wp-json\/wp\/v2\/posts\/178\/revisions"}],"predecessor-version":[{"id":190,"href":"https:\/\/www.k2ie.net\/blog\/wp-json\/wp\/v2\/posts\/178\/revisions\/190"}],"wp:attachment":[{"href":"https:\/\/www.k2ie.net\/blog\/wp-json\/wp\/v2\/media?parent=178"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.k2ie.net\/blog\/wp-json\/wp\/v2\/categories?post=178"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.k2ie.net\/blog\/wp-json\/wp\/v2\/tags?post=178"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}