How to Install and Uninstall lacme-accountd Package on Kali Linux

Last updated: May 09,2024

1. Install "lacme-accountd" package

Please follow the guidance below to install lacme-accountd on Kali Linux

$ sudo apt update $ sudo apt install lacme-accountd

2. Uninstall "lacme-accountd" package

This tutorial shows how to uninstall lacme-accountd on Kali Linux:

$ sudo apt remove lacme-accountd $ sudo apt autoclean && sudo apt autoremove

3. Information about the lacme-accountd package on Kali Linux

Package: lacme-accountd
Source: lacme
Version: 0.8.2-1
Installed-Size: 39
Maintainer: Guilhem Moulin
Architecture: all
Depends: libconfig-tiny-perl, libjson-perl, perl:any
Recommends: libcrypt-openssl-rsa-perl
Suggests: gpg, openssl
Size: 18536
SHA256: a5f0f9201bbb59a04de3ab1b88fbe7c67f336429277c10223c24b5cf3f10f554
SHA1: 02dcdc1c983adcfbe83ea6d14faab8f915410e4a
MD5sum: c0320f93b286276a576a5f30d7fe09d5
Description: lacme account key manager
lacme is an ACME client which can be used to request X.509 certificates from
ACME service providers such as Let's Encrypt or ZeroSSL. The architecture is
designed with process isolation and minimal privileges in mind, and is divided
into four components:
.
* A process to manage the account key and issue SHA-256 signatures needed for
each ACME command. (This process binds to a UNIX-domain socket to reply to
signature requests from the ACME client.) One can use the UNIX-domain
socket forwarding facility of OpenSSH 6.7 and later to run this process on
a different host.
.
* A "master" process, which runs as root and is the only component
with access to the private key material of the server keys. It is used to
fork the ACME client (and optionally the ACME webserver) after dropping
root privileges. For certificate issuances, it also generates Certificate
Signing Requests, then verifies the validity of the issued certificate, and
optionally reloads or restarts services.
.
* An actual ACME client, which builds ACME commands and dialogues with
the remote ACME server. Since ACME commands need to be signed with the
account key, the "master" process passes the UNIX-domain socket of the
account key manager to the ACME client: data signatures are requested by
writing the data to be signed to the socket.
.
* For certificate issuances, an optional webserver, which is spawned
by the "master" process when no service is listening on the HTTP port.
(The only challenge type currently supported is "http-01", which requires a
webserver to answer challenges.) That webserver only processes GET and
HEAD requests under the "/.well-known/acme-challenge/" URI. iptables(8)
rules can optionally be installed to temporarily open the HTTP port.
.
lacme-accountd is the first (account key manager) component. It is the only
component with access to the account key.
Description-md5:
Multi-Arch: foreign
Homepage: https://git.guilhem.org/lacme/about/
Section: utils
Priority: optional
Filename: pool/main/l/lacme/lacme-accountd_0.8.2-1_all.deb