|

10 Tips for Understanding SSL Secure Connections

SSL (Secure Socket Layer) is a security protocol that provides communication privacy and data integrity between two communicating applications. It’s mainly used in web browsers and web servers to encrypt the traffic between them. In this blog post, we will discuss SSL in detail with some examples. what is an ssl connection? An SSL connection…

10 Must-know Tips about SSH sshd_config file

If you’re administering a Linux server, then you’re likely familiar with the Secure Shell (SSH) protocol. SSH is a secure communications protocol used for logging into remote servers and executing commands. The sshd_config file is the configuration file for the SSH daemon, sshd. In this article, we will take a look at everything you need…

|

2 Ways to Fix SSL_ERROR_RX_RECORD_TOO_LONG

The error “SSL_ERROR_RX_RECORD_TOO_LONG” usually is a wrong configuration on the server-side. This usually means the implementation of SSL on an external server is not correct. The error is usually caused by a server-side problem which the server administrator will need to investigate. When the client is trying to connect to this server, we will get…

|

2 ways to fix x509 certificate routines:X509_check_private_key:key values mismatch

For SSL key values mismatch issue, there are two main reasons. Error message about X509_check_private_key:key values mismatch root@s17925268:~# service nginx restartRestarting nginx: nginx: [emerg] SSL_CTX_use_PrivateKey_file(“/etc/nginx/conf.d/ssl/ssl.key”) failed (SSL: error:0B080074:x509 certificate routines:X509_check_private_key:key values mismatch) nginx: configuration file /etc/nginx/nginx.conf test failed Failed to load private key from ./envoy/test/extensions/transport_sockets/tls/test_data/san_dns2_key.pem, Cause: error:0b000074:X.509 certificate routines:OPENSSL_internal:KEY_VALUES_MISMATCH Thu Jul 28 17:55:12 2016 OpenSSL:…

Understanding Linux ulimit Command with Examples

Most UNIX-like operating systems, including Linux and macOS, provide ways to limit and control the usage of system resources such as threads, files, and network connections on a per-process and per-user basis. These “ulimits” prevent single users from using too many system resources. Sometimes, these limits have low default values that can cause a number…