SSL (Secure Socket Layer) is a security protocol that provides communication privacy and data integrity between two communicating applications. It’s mainly used in web browsers and web servers to encrypt the traffic between them. In this blog post, we will discuss SSL in detail with some examples. what is an ssl connection? An SSL connection …
Cloud
If you’re administering a Linux server, then you’re likely familiar with the Secure Shell (SSH) protocol. SSH is a secure communications protocol used for logging into remote servers and executing commands. The sshd_config file is the configuration file for the SSH daemon, sshd. In this article, we will take a look at everything you need …
The error “SSL_ERROR_RX_RECORD_TOO_LONG” usually is a wrong configuration on the server-side. This usually means the implementation of SSL on an external server is not correct. The error is usually caused by a server-side problem which the server administrator will need to investigate. When the client is trying to connect to this server, we will get …
For SSL key values mismatch issue, there are two main reasons. Error message about X509_check_private_key:key values mismatch root@s17925268:~# service nginx restart Restarting nginx: nginx: [emerg] SSL_CTX_use_PrivateKey_file(“/etc/nginx/conf.d/ssl/ssl.key”) failed (SSL: error:0B080074:x509 certificate routines:X509_check_private_key:key values mismatch) nginx: configuration file /etc/nginx/nginx.conf test failed Failed to load private key from ./envoy/test/extensions/transport_sockets/tls/test_data/san_dns2_key.pem, Cause: error:0b000074:X.509 certificate routines:OPENSSL_internal:KEY_VALUES_MISMATCH Thu Jul 28 17:55:12 2016 …
The OS version of a Linux distribution can be determined by using the command-line interface as well as a graphical user interface. In Linux, CLI is preferred over GUI as it provides more control over the OS. In this article, we will mostly focus on the command line methods which can be used to check …
When the “Too Many Open Files” error message is written to the logs, it indicates that all available file handles for the process have been used (this includes sockets as well). In a majority of cases, this is the result of file handles being leaked by some part of the application. ulimit is a command …
Most UNIX-like operating systems, including Linux and macOS, provide ways to limit and control the usage of system resources such as threads, files, and network connections on a per-process and per-user basis. These “ulimits” prevent single users from using too many system resources. Sometimes, these limits have low default values that can cause a number …
Linux file system is generally a built-in layer of a Linux operating system used to handle the data management of the storage. It controls how data is stored and retrieved. It manages the file name, file size, creation date, and much more information about a file. We will cover how to check file system type …
fsck is a front-end program and it calls the respective program for the specific filesystem to run. Fsck usually runs after the system fails to boot, the file system becomes corrupted, or the attached drive fails to function properly. When we need run fsck command in Linux The system automatically finds system inconsistent usually after …
On a Linux system, TCP ports in a reserved range (typically less than 1024) can only be bound by processes with root privilege. If we’re trying to bind a port in a Linux environment less 1024, we will receive a “Permission denied” error. Listen tcp :80: bind: permission denied So we should do either: Use …