How to Install and Uninstall lacme Package on Kali Linux

Last updated: May 03,2024

1. Install "lacme" package

This tutorial shows how to install lacme on Kali Linux

$ sudo apt update $ sudo apt install lacme

2. Uninstall "lacme" package

Please follow the step by step instructions below to uninstall lacme on Kali Linux:

$ sudo apt remove lacme $ sudo apt autoclean && sudo apt autoremove

3. Information about the lacme package on Kali Linux

Package: lacme
Version: 0.8.2-1
Installed-Size: 142
Maintainer: Guilhem Moulin
Architecture: all
Depends: adduser, libconfig-tiny-perl, libjson-perl, libnet-ssleay-perl, libtimedate-perl, libwww-perl, openssl (>= 1.1.0~), perl:any
Recommends: lacme-accountd (>= 0.8.0), liblwp-protocol-https-perl
Size: 48660
SHA256: b2ffd7dfeaf4025bc4d09a089f08a522dd2220b2cd1b60cc09a85eff7e058323
SHA1: 18de84a2fa084bf6816f5f809c59221a464b70d5
MD5sum: 0729e41490e7d297a2d77b4a7f5f6efb
Description: ACME client written with process isolation and minimal privileges in mind
lacme is an ACME client which can be used to request X.509 certificates from
ACME service providers such as Let's Encrypt or ZeroSSL. The architecture is
divided into four components, each with its own executable:
.
* A process to manage the account key and issue SHA-256 signatures needed for
each ACME command. (This process binds to a UNIX-domain socket to reply to
signature requests from the ACME client.) One can use the UNIX-domain
socket forwarding facility of OpenSSH 6.7 and later to run this process on
a different host.
.
* A "master" process, which runs as root and is the only component
with access to the private key material of the server keys. It is used to
fork the ACME client (and optionally the ACME webserver) after dropping
root privileges. For certificate issuances, it also generates Certificate
Signing Requests, then verifies the validity of the issued certificate, and
optionally reloads or restarts services.
.
* An actual ACME client, which builds ACME commands and dialogues with
the remote ACME server. Since ACME commands need to be signed with the
account key, the "master" process passes the UNIX-domain socket of the
account key manager to the ACME client: data signatures are requested by
writing the data to be signed to the socket.
.
* For certificate issuances, an optional webserver, which is spawned
by the "master" process when no service is listening on the HTTP port.
(The only challenge type currently supported is "http-01", which requires a
webserver to answer challenges.) That webserver only processes GET and
HEAD requests under the "/.well-known/acme-challenge/" URI. By default
some iptables(8) rules are automatically installed to open the HTTP port,
and removed afterwards.
Description-md5:
Homepage: https://git.guilhem.org/lacme/about/
Section: utils
Priority: optional
Filename: pool/main/l/lacme/lacme_0.8.2-1_all.deb