CloudInsidr

Cyber security, infotech

  • Subscribe!
  • Privacy Policy
  • Legal
  • Contact Us

Join us on Twitter: @CloudInsidr

  • news & alerts
    • events
    • industry analysis
    • industry gossip
    • people
  • cloud, edge & co.
    • AWS
    • administration & orchestration
      • web servers in the cloud
      • mail servers
      • databases
  • cybersec & warfare
    • encryption
  • blockchain
Home Archives for Uncategorized
Upgrading from CentOS 6 to CentOS 7 and Beyond?

Cloud Insidr 2025-01-11 Leave a Comment

Upgrading from CentOS 6 to CentOS 7 and Beyond?

Upgrading from CentOS 6 to CentOS 7 involves a manual approach, as the standard yum update and migration paths won’t work anymore. 

CentOS 6 to 7 upgrades are inherently risky, especially with outdated repositories. Consider migrating directly to a modern distribution like Rocky Linux or AlmaLinux. Tools like ELevate can help with migration from CentOS 6/7 to newer distributions.

The ELevate Project by AlmaLinux offers a community-supported tool for upgrading CentOS 7 to newer RHEL-based distributions. While it doesn’t support CentOS 6 directly, you could consider upgrading from CentOS 6 to 7 first, then use ELevate for further upgrades.

[Read more…]

Filed Under: Linux, Uncategorized Tagged With: Red Hat

Cloud Insidr 2024-05-01 Leave a Comment

OpenSSL 3.3 Final Release is now live!

The latest iteration of OpenSSL, version 3.3, has been officially rolled out, marking a significant milestone as the inaugural release under OpenSSL’s biannual time-based release strategy. The OpenSSL team extends its heartfelt gratitude to all contributors whose efforts have been instrumental in bringing OpenSSL 3.3 to fruition.

Key enhancements introduced in OpenSSL 3.3 include:

  • Provision of QUIC qlog diagnostic logging support
  • Facilitation of non-blocking polling for multiple QUIC connections or stream objects
  • Streamlined generation of end-of-stream frames for QUIC connections
  • Option to disable QUIC event processing during API calls
  • Customizable configuration for QUIC idle timeout durations
  • Enhanced capability to ascertain the size and utilization of a QUIC stream’s write buffer
  • Incorporation of RFC 9480 and RFC 9483 extensions to CMP
  • Flexibility to deactivate OpenSSL usage of atexit(3) during build time
  • Integration of SSL_SESSION APIs compatible with the year 2038
  • Automated derivation of Chinese Remainder Theorem (CRT) parameters upon request
  • Adaptability to accommodate unknown algorithm names in TLS signature algorithm and group configuration strings
  • Configuration option for TLS 1.3 servers to prioritize PSK-only key exchange during session resumption
  • Introduction of the EVP_DigestSqueeze() API, facilitating multiple squeezes with varied output sizes for SHAKE
  • Inclusion of exporters for CMake on Unix and Windows platforms, alongside the pkg-config exporter

For a comprehensive overview of all modifications between OpenSSL 3.2 and OpenSSL 3.3, please refer to the CHANGES.md file.

OpenSSL 3.3 marks the commencement of a standard release cycle, initiating a one-year Full Support phase. During this period, our team diligently addresses bugs and security concerns in accordance with our Stable Release Updates Policy. Following the conclusion of the Full Support phase, the Maintenance Support phase commences, lasting another year, with a primary focus on rectifying security issues while addressing other pertinent bugs at our discretion.

OpenSSL 3.3 Download Pages for Fedora Linux

Fedora Rawhide – 3.2.1-6.fc41

Fedora 40 – 3.2.1-2.fc40

Fedora 39 3.1.1-4.fc39

Fedora 38 3.0.9-2.fc38

Looking Ahead to OpenSSL 3.4

Looking ahead, the forthcoming release, OpenSSL 3.4, is currently under the stewardship of Neil Horman (@nhorman). Detailed information regarding the release schedule can be accessed via the new OpenSSL Release Schedule board on GitHub.

For any bug reports or issues concerning OpenSSL, we encourage users to utilize our issue tracker, while queries pertaining to the utilization of OpenSSL 3.3 can be directed to GitHub Discussions.

Filed Under: encryption, homeland security, Linux, Uncategorized

SELinux security contexts: correcting SELinux labels on a file system

Filipe Martins 2022-03-21 Leave a Comment

SELinux security contexts: correcting SELinux labels on a file system

SELinux can be such a nuisance. In particular, if you have a newly created file system, you will need to add labels to it, also known as SELinux security contexts.

[Read more…]

Filed Under: Linux, NGINX, SELinux, Uncategorized Tagged With: cyber security, SELinux

Intel gobbling up Israeli Tower Semiconductor, Stock Goes Through The Roof

Cloud Insidr 2022-02-15 Leave a Comment

Intel gobbling up Israeli Tower Semiconductor, Stock Goes Through The Roof

Intel (INTC) is getting close to a deal to buy the Israeli-based chip foundry Tower Semiconductor (TSEM). The foundry saw its shares go through the roof late Monday by as much as 50%.

[Read more…]

Filed Under: Uncategorized

Log4j RCE and mitigation techniques

Cloud Insidr 2021-12-21 Leave a Comment

Log4j RCE and mitigation techniques

For quite some time it seemed as if cyber vulnerabilities in the Java ecosystem would be losing ground. Instead, it was the calm before the storm: a vulnerability in the Log4j library threatens web servers and other applications in a variety of ways.

[Read more…]

Filed Under: Java, Uncategorized Tagged With: Five Eyes Alliance, Java, Log4j, RCE

  • 1
  • 2
  • 3
  • …
  • 6
  • Next Page »

Subscribe

SSL/TLS Certificate Square (250 x 250)

Pearson Education (InformIT)

SSL/TLS Certificate Medium Rectangle (300 x 250)

©2022 CybrAnalytiqa OÜ

  • Content purchasing and syndication