Skip to main content


Redis on Linux Server

From this post, I am starting a series of posts/pages which will mostly based on caching (recently i read this blog and found out quite simple to understand about what and why we need caching) mechanism like Redis, Memcache, Apc, Varnish are the few to list. So, here on this post i am going to cover REDIS first. After reading this post, you will get to know                                                                                                                       What is Redis ? So, Redis is "no-sql" database which is used to stores data as keys. which is mainly used as database,as caching for website across the globe. NoSql means, there is no structure query language like mysql in redis, instead its data structure.                                                           Where it is Beneficial ? Many of the website are using redis to fasten their response time to the end user using the advantages of redis. So if you want your we

useful ubuntu/debian commands for sys-Admin

To clean the cache from system which apt caches when we update/install the packages apt-get clean    To downloads  packages list from repository and update them,to get data on latest available packages apt-get update   To install specific version of  package apt-get install package-name  To check OS version    Ex : lsb_release -a To provides the package's description, its dependencies, the name of its maintainer. apt search, apt show, aptitude search, aptitude show work in the similar manner Ex : apt-cache search php5-fpm The checkrestart program tries to determine if there are  processes  in the  system  that  need to be restarted after a system upgrade .Consequently, checkrestart is sometimes used as an audit tool  to  find outdated  versions  of  libraries  in  use, particularly after security upgrades Ex : checkrestart -h  List all installed packages, along with package version and short details. Ex : dpkg -l php5-fpm

Vulnerbilities affecting Web and Mail Servers - Logjam-Freak

  Recently we came across a vulnerability know as Logjam which according to researchers any attacker or Man in the middle can exploit weak  Diffie–Hellman key Algorithm. this vulnerability has denoted with CVE number as  CVE-2015-4000.   How DH Algorithm gets exploited Traditionally, secure encrypted communication between two parties (here browser and servers) required that they first exchange keys by some secure physical channel. The Diffie–Hellman key exchange method allows two parties that have no prior knowledge of each other to jointly establish a shared secret key over an insecure channel.   Here attacker can force the communication between the server and browser to downgrade to lower bit export grade cryptography. The attackers can attacks any servers that support DHE_EXPORT ciphers and affects mostly all browsers. Recommendation : 1) Disable Export Cipher Suites Even though modern browsers no longer support export suites, the FREAK and Logjam attac

Subject Alernative names with Openssl

In this post we will see, how can we create CSR with SAN, which stands for Subject Alternative Names and obviously using openssl command. For those who do not know what is SAN, let me cover this in short.There are 3 main types of SSL  Standard SSL  :- Used for securing single domain. like, i,e one domain -- one certificate Wild card SSL : - Used for securing multiple sub-domains like in single certificate, i.e multiple subdomain --- single certificate Multi-domain SSL : -- Used for securing multiple domains, like,,, i,e multiple domains --- single certificate. So, SAN comes under multiple domains certificate category. When you purchase a multi-domain certificate from certificate issuing authority ,they give you options of defining SAN along with primary domain. So, Here we are discussing about how to create CSR(which is required while purchasing the certificate) with SAN itself.

Check CSR and Private Key are matching or not.

  If you are managing many of sites and their respective SSL certs, some times ,we come across a situation where we messed up with SSL certs and their CSR and private keys,   Where we do not know, which private key belongs to which Cert and which private key belongs to which CSR. This happen only if proper management of keeping SSL files are not in used  after all we are all human being ,who do mistakes :)  right ? so, here on this page I will tell you , how to check which cert belongs to which private key and which CSR belongs to which private key , and that is  only using openssl command on the terminal itself, after all we are love linux terminal :) So , here it is, openssl rsa -noout -modulus -in mydomain.key | openssl md5  openssl req -noout -modulus -in mydomain.csr | openssl md5 openssl x509 -noout -modulus -in domain.crt | openssl md5 If you find the output of all command identical ,high probability is that all files i.e private key ,csr and certificate are match

How to Generate CSR using Openssl in Linux

Before Generating CSR ,let see what is Openssl. It is nothing but a core library ,which is used for general purpose in cryptography,it is an open source product which work towards the implementation of SSL and TLS protocols. Talking about openssl, some people called the certificates generated from openssl as "self signed certificate". lets go towards now,creating CSR and private key using openssl command, Just log in to any of your Linux box and run following command as  root user  replacing the required information as per your need . [root@SVR home]#   openssl req -new -newkey  rsa:2048 -nodes -sha256 -out domain_name.csr -keyout domain_name.key -subj "/C=US/ST=state/L=locality/O=organization/OU=organization unit Dept/"  You will get output like : Then check whether ,all the information we have entered ,while creating CSR is proper ,by decoding the CSR from some online tool. First do the cat to the csr file [root@SVR home]#  cat

Features of Linux

              1. Virtual memory, allowing the system to use disk room the same as RAM memory.    2. Multiple user capability.    3. Protected mode so programs or user's can't access unauthorized areas.    4. True multitasking    5. X - A graphical user interface similar to windows, but supports remote sessions over a network.    6. Advanced server functionality           * FTP server           * Telnet server           * BOOTP server           * DHCP server           * Samba server           * DNS server           * SNMP services           * Mail services           * Network file sharing           * and, much more...    7.supports various file systems Why to Use    1. Free    2. Runs on various machine architectures    3. Works well on machines that are not "modern". Recommended 8MB RAM, with 16MB swap drive space. It will run in hard drives as small as 500MB or less.    4. Linux is stable and even if a program crashes, it won't br