explainshell.com

VN:F [1.9.22_1171]
Rating: 6.0/10 (1 vote cast)

Match linux command-line arguments to view their help text.

stackshare.io

VN:F [1.9.22_1171]
Rating: 8.0/10 (1 vote cast)

Dev / Production stacks for all to see. Handy tool to see what software is trending today.

aws.amazon.com

VN:F [1.9.22_1171]
Rating: 7.7/10 (3 votes cast)

Amazons’s cloud computing & web hosting service.

Amazon Bedrock AgentCore is now available in the South America (São Paulo) Region

1 May 2026 @ 10:00 pm

Amazon Bedrock AgentCore is now available in the AWS South America (São Paulo) Region. Amazon Bedrock AgentCore is the platform to build, connect, and optimize agents. It helps engineers ship agents fast with any framework and any model, connect them to enterprise systems and tools, and optimize them continuously, with security enforced at the infrastructure layer that agents can't bypass. With this expansion, customers in South America can deploy and operate agents closer to their end users, reducing latency and helping meet data residency requirements. AgentCore capabilities including agent runtime, identity, gateway, policy, observability, code interpreter, and browser tools are available in the São Paulo Region at launch. For more information on AgentCore, visit the AgentCore product page or the AgentCo

FreeRTOS 202604 LTS now available with enhanced security and MQTT v5.0

1 May 2026 @ 9:42 pm

FreeRTOS 202604 LTS, a new Long Term Support release of the open-source real-time operating system for embedded devices, is now available. This release provides embedded systems developers and Internet of Things (IoT) device manufacturers with feature stability, security updates, and critical bug fixes for two years. It addresses key challenges in embedded systems, including memory safety, code quality, and protocol support. FreeRTOS kernel v11.3.0 introduces new hardware ports, security hardening, and expanded Memory Protection Unit (MPU) support, reducing the number of MPU regions claimed by FreeRTOS and allowing developers to reserve hardware regions for application-specific memory protection. Additionally, coreMQTT v5.0.2 adds MQTT v5.0 protocol support, enabling features like topic aliases for bandwidth-constrained devices and request/response patterns for interactive IoT applications. coreSNTP v2.0.0 brings year 2038 readiness, so devices deployed today can validate T

OpenSearch UI supports cross-region data access to OpenSearch domains

1 May 2026 @ 8:54 pm

Amazon OpenSearch Service now supports cross-region data access for OpenSearch UI, enabling users to access OpenSearch domains hosted in different AWS Regions from within a single OpenSearch UI application. Combined with the cross-account data access launch earlier this year, you can now query or build dashboards on OpenSearch domains in flexible combinations of accounts and Regions - without switching endpoints or replicating data. Cross-region data access is available for OpenSearch domains hosted in both public and Virtual Private Cloud (VPC) configurations. With cross-region data access, teams can build centralized analytics, search, and observability workflows across globally distributed deployments while keeping data in place - meeting data residency requirements, minimizing inter-region egress, and preserving each Region’s latency an

Amazon CloudFront Announces WebSocket Support for VPC Origins

1 May 2026 @ 7:30 pm

Amazon CloudFront now supports WebSockets traffic through Virtual Private Cloud (VPC) origins, enabling you to use CloudFront as the single entry point for real-time applications hosted entirely in private subnets. WebSockets support extends VPC origins to applications that require persistent, bidirectional connections between clients and servers, such as chat platforms, collaborative editing tools, live dashboards, and IoT device management systems. Previously, customers running real-time applications over WebSockets had to keep their origins in public subnets and use Access Control Lists and other mechanisms to restrict access to their WebSockets-enabled servers. Customers had to spend ongoing effort to implement and maintain these solutions. Now, customers can place their Application Load Balancers (ALB), Network Load Balancers (NLB), and EC2 instances serving WebSockets traffic in private subnets accessible only through their CloudFront distributions. CloudFront serves

IAM Roles Anywhere now enforces VPC endpoint policies for the CreateSession API

1 May 2026 @ 4:00 pm

AWS Identity and Access Management (IAM) Roles Anywhere now provides the capability to configure Virtual Private Cloud (VPC) endpoint policies for the IAM Roles Anywhere CreateSession API. You can update your VPC endpoint policies to allow or deny the CreateSession operation. If CreateSession is not explicitly included in the Allow statement of your VPC endpoint policy or if you don’t allow all operations (for example, by specifying “rolesanywhere:*“ as the action), IAM Roles Anywhere will not return temporary AWS credentials for requests made through your VPC endpoint. The CreateSession API enables workloads running outside of AWS to obtain temporary AWS credentials using X.509 certificates to access AWS resources. Previously, VPC endpoint policies applied to all IAM Roles Anywhere API operations except CreateSession. This launch closes that gap, giving you consistent, fine-grained access control across all IAM

AWS Transform now offers BI migration agents for Power BI and Tableau to Amazon Quick

1 May 2026 @ 3:00 pm

AWS Transform customers can now use BI migration agents to convert Tableau and Power BI dashboards to Amazon Quick Sight (BI capability of Amazon Quick) assets, helping reduce migration effort from months to days. These agents are built by Wavicle Data Solutions, an AWS Advanced Consulting Partner, leveraging the AWS Transform initiative to create differentiated transformation solutions by integrating specialized agents, tools, knowledge bases, and workflow with AWS Transform’s agentic AI capabilities. Four agents are available for purchase through AWS Marketplace: one Analyzer agent and one Converter agent for each BI migration source (Power BI and Tableau). AWS Transform is a collaborative enterprise IT transfor

Amazon Redshift Introduces Concurrency Scaling Support for auto-copy and zero-ETL

1 May 2026 @ 3:00 pm

Amazon Redshift announces the general availability of Amazon Redshift concurrency scaling support for Amazon Redshift auto-copy and zero-ETL, enhancing the performance of data ingestion. This new feature combines the power of auto-copy's seamless data ingestion from Amazon S3 and zero-ETL's near real-time data replication from operational database, transactional database, and applications with the elasticity of concurrency scaling. The enhancement delivers benefits for high-volume, time-sensitive data operations. Auto-copy monitors S3 buckets and loads new data files automatically, while zero-ETL replicates data from operational and transactional databases in near real-time. When enable

Spatial Data Management on AWS adds custom transformations

1 May 2026 @ 2:35 pm

Spatial Data Management on AWS (SDMA) now supports custom transformation connectors and a unified desktop client installer. Custom transformation connectors let you run compute-intensive processing — such as format conversion, 3D rendering, image tiling, or metadata extraction — by submitting jobs to AWS Deadline Cloud using Open Job Description templates. You can extend SDMA's built-in content analysis with custom logic to verify formats, extract attributes, or run transformations that require dedicated compute resources. Connectors run in isolated compute environments and automatically ingest declared outputs back into SDMA's governed asset repository, enabling you to automate and chain processing workloads across your spatial data pipeline. The SDMA desktop application now includes a standalone installer that bundles all required dependencies, removing the need to separately install the CLI or other components. These features are available in the following AWS

Announcing Kubernetes Dynamic Resource Allocation for Elastic Fabric Adapter

1 May 2026 @ 2:00 pm

Amazon Elastic Kubernetes Service (Amazon EKS) now supports Dynamic Resource Allocation (DRA) for Elastic Fabric Adapter (EFA), simplifying high-performance inter-node communication and RDMA (Remote Direct Memory Access) for artificial intelligence, machine learning, and High Performance Computing (HPC) workloads. The EFA DRA driver, built on the upstream DRANET project, brings EFA interface sharing and topology-aware allocation for workloads running on Kubernetes. With the EFA DRA driver, you can allocate EFA interfaces and accelerator devices that share the same PCIe root or device group, ensuring inter-node traffic flows through the closest network interface to each NVIDIA GPU, AWS Trainium, or AWS Inferentia device on the node. The EFA DRA driver also supports EFA interface sharing across workloads on the same node to maximize EFA interface utilizatio

Amazon RDS for SQL Server supports read replica with additional storage volumes

1 May 2026 @ 7:00 am

Amazon Relational Database Service (Amazon RDS) for SQL Server now supports read replicas for database instances with additional storage volumes. Additional storage volumes allow customers to scale database storage up to 256 TiB by adding up to three storage volumes, each with up to 64 TiB, in addition to the primary storage volume. With this launch, for database instances configured with additional storage volumes, customers can create same-region and cross-region read replica database instances. When a read replica is created for a database instance with additional storage volumes, the replica preserves the storage layout of the source instance, including the configuration of any additional storage volumes. After the initial creation, you can independently manage additional storage volume configurations on the source and read replica instances. Read replicas with additional storage volumes are available in all A

networkworld.com

VN:F [1.9.22_1171]
Rating: 6.0/10 (1 vote cast)

Information, intelligence and insight for Network and IT Executives.

Extreme Networks: Memory advantage, Wi-Fi 7 and competitive flux drive momentum

1 May 2026 @ 7:09 pm

Extreme Networks is relying heavily on a number of key technologies—including its network fabric and cloud management portfolios to build toward the future—but more immediately, it is leaning on a system memory advantage, Wi-Fi 7 development and the changing competitive landscape to drive growth. For now momentum is represented as five consecutive quarters of double-digit financial growth—its most recent 3Q ended March 31 with sales of $316.9 million, an 11% year-over-year increase and eight consecutive quarters of product growth. “Our results reinforce our momentum as the fastest-growing enterprise networking player,” president, CEO & executive director,

Scenes from the great data center revolt

1 May 2026 @ 5:34 pm

American citizens and politicians alike have turned on the expansion of data centers in their communities with incredible rapidity.  Data centers have gone from curiosities that few paid any attention to, to pariahs blame for ruining the local climate, driving up electric bills, and consuming way too much fresh water. Every day a new fight springs up on the Facebook group “Say NO to Data Centers,” which has 75,00 followers and climbing.  A roundup of the most recent notable anti-data center news includes: The Recall: The small town of Festus, Missouri (population: 14,000) immediat

Enterprise Spotlight: Transforming software development with AI

1 May 2026 @ 4:39 pm

Artificial intelligence has had an immediate and profound impact on software development. Coding practices, coding tools, developer roles, and the software development process itself are all being reimagined as AI agents advance on every stage of the software development life cycle, from planning and design to testing, deployment, and maintenance. Download the May 2026 issue of the Enterprise Spotlight from the editors of CIO, Computerworld, CSO, InfoWorld, and Network World and learn how to harness the power of AI-enabled development. Get the Spotlight report here:

When 170,000 people show up: Network refresh readies Churchill Downs for Kentucky Derby

1 May 2026 @ 2:22 am

Churchill Downs may be best known for the Kentucky Derby’s two-minute spectacle, but behind the scenes, the historic venue is undergoing a network transformation that offers lessons for any enterprise grappling with massive scale, security complexity, and extreme demand variability. The company recently designated Cisco as its official partner for enterprise networking and network infrastructure and will deploy more than 7,000 switches across its 26 properties, including 12 regional casinos and 18 racing venues. What makes this deployment particularly instructive isn’t just its scale but how Churchill Downs Incorporated (CDI) navigated the transition from a collection of disparate n

Network jobs watch: Hiring, skills and certification trends

30 April 2026 @ 8:08 pm

Network and infrastructure roles continue to shift as enterprises adopt technologies such as AI-driven network operations, multicloud networking, zero trust network access (ZTNA), and SD-WAN. Here’s a recap of some of the latest industry research, hiring s

IT certification pay surges as noncertified skills slump

30 April 2026 @ 6:43 pm

Cash pay premiums for 663 IT certifications jumped sharply, posting their strongest quarterly jump in roughly a decade, according to new data from Foote Partners’ IT Skills and Certifications Pay Index. Conversely pay for 746 noncertified IT skills dropped 2.2% in Q1 2026, representing the steepest single-quarter decline since 2002, the data revealed.

QuEra claims quantum error correction breakthrough with 2-to-1 qubit ratio

30 April 2026 @ 2:37 pm

Quantum computers are prone to high error rates, so, to make qubits usable, a lot of redundancy is required. It typically takes hundreds—even thousands—of physical qubits to make one usable, “logical” qubit. This has been a major obstacle to the development of practical quantum computers. If thousands of qubits are needed for a quantum computer to do anything useful, and it takes a thousand physi

HPE expands ProLiant line with rugged edge servers

30 April 2026 @ 1:54 pm

HPE has expanded its Proliant server family with a trio of new boxes aimed at supporting distributed AI and other workloads in all manner of edge locations. The new servers include two Gen12-based boxes known as HPE ProLiant Compute EL2000 chassis and the HPE ProLiant DL145 Gen11 server, all optimized for harsh or remote edge environments across branch offices, retail, manufacturing, factories, power plants, and national security-related operations, the company stated. “Purpose‑built infrastructure is not a feature or a certification. It is a system‑level design approach that accounts for environment, performance, security, and operations together,” wrote

Deconstructing the data center: A massive (and massively liberating) project

30 April 2026 @ 9:00 am

A few years back, Bhaskar Ramachandran read the tea leaves and what he saw was clear: With all the enhancements hyperscalers continuous make, there was no value in having on-premises data centers any longer. “There is just no way for a private company to match that,” says Ramachandran, global vice president and CIO of paints and coatings manufacturer PPG. “This is their business, and they’re really good at it, and it was clear that the size of the hyperscalers is just going to win over the infrastructure game. So it didn’t make sense for us to keep up with the infrastructure.�

Cisco bolsters security, AI support in latest SD-WAN release

29 April 2026 @ 8:57 pm

Cisco has bolstered the security and AI control features in its latest release of SD-WAN software. The company rolled out Cisco SD-WAN 26.1.1 with a number of new features that, for example, let enterprise customers define security policies once and apply them consistently across the network, gain end-to-end visibility, and pivot from a traditional WAN to a high-performance, AI-ready fabric—all without requiring a major ar

forensicswiki.org

VN:F [1.9.22_1171]
Rating: 8.0/10 (1 vote cast)

Computer forensic tools and techniques used by investigators

cyberciti.biz

VN:F [1.9.22_1171]
Rating: 6.0/10 (2 votes cast)

online community of new and seasoned Linux / Unix sysadmins.

Unable to load the feed. Please try again later.

heartinternet.co.uk

VN:F [1.9.22_1171]
Rating: 8.3/10 (3 votes cast)

Hosting packages for an initial web presence

What Is the Future of the Internet?

1 May 2026 @ 10:30 am

The post What Is the Future of the Internet? appeared first on Heart Internet.

Copy Fail Linux Vulnerability (CVE-2026-31431)

30 April 2026 @ 2:43 pm

On 29 April 2026, security researchers at Theori (Xint Code) publicly disclosed CVE-2026-31431, known as “Copy Fail.” It is a local privilege escalation flaw in the Linux kernel’s AF_ALG cryptographic... The post Copy Fail Linux Vulnerability (CVE-2026-31431) appeared first on Heart Internet.

How to Reduce the Bounce Rate of Your WordPress Site

24 April 2026 @ 10:30 am

The post How to Reduce the Bounce Rate of Your WordPress Site appeared first on Heart Internet.

How to Check for Available Domains

31 March 2026 @ 1:48 pm

The post How to Check for Available Domains appeared first on Heart Internet.

SSL Certificates are changing. Here’s what you need to know.

17 March 2026 @ 10:12 am

The rules around SSL certificates are changing across the whole internet. The good news is that for most customers, very little will change on your side. This is an industry-wide... The post SSL Certificates are changing. Here’s what you need to know. appeared first on Heart Internet.

Hosting VPS Linux vs Windows VPS

9 March 2026 @ 3:03 pm

The post Hosting VPS Linux vs Windows VPS appeared first on Heart Internet.

Domain Name Transfer Checklist: Everything You Need to Know

3 March 2026 @ 2:56 pm

The post Domain Name Transfer Checklist: Everything You Need to Know appeared first on Heart Internet.

Heart Internet Win Gapstars Innovation Award 2026

23 February 2026 @ 11:57 am

We’re incredibly proud to celebrate our Site Reliability Engineering team, who have won the Gapstars Innovation Award for their outstanding work improving platform stability, security, and visibility across our shared... The post Heart Internet Win Gapstars Innovation Award 2026 appeared first on Heart Internet.

A/B Testing Explained: A Practical Guide To Better Results | Part 1

20 February 2026 @ 8:32 am

If you want to improve your website you probably need to do A/B testing, otherwise known as split testing. Instead of guessing, A/B testing allows you to experiment more scientifically.... The post A/B Testing Explained: A Practical Guide To Better Results | Part 1 appeared first on Heart Internet.

How to enable two-factor authentication (2FA) on your Heart Internet account

28 January 2026 @ 12:37 pm

Account security matters, and switching on two-factor authentication (2FA) is a quick win. 2FA adds a second check during the sign-in process, so even if someone compromises your password, they still can’t get in.  To enable 2FA:  Step 1: Open your... The post How to enable two-factor authentication (2FA) on your Heart Internet account appeared first on Heart Internet.

serverfault.com

VN:F [1.9.22_1171]
Rating: 6.0/10 (1 vote cast)

Common Server issues – FAQs and answers from those in the know

Google Cloud project suspended due to crypto mining – cannot access console to investigate or fix

3 May 2026 @ 9:49 am

I am facing an issue with my Google Cloud project which has been suspended due to suspected cryptocurrency mining activity. The problem is that the entire project is now restricted, and I cannot access any part of the Google Cloud Console. Every page (VM instances, IAM, logs, etc.) redirects to the appeal page. Because of this restriction, I am unable to: Check Cloud Logging for suspicious activity Stop or delete the suspected VM instance I have already submitted an appeal to Google Cloud, but it may take up to 2 business days, which is critical for our live system. My questions: Is there any way to gain limited access to the project to perform cleanup actions while the appeal is under review? Are there any alternative methods (CLI, APIs, etc.) to stop or delete resources in a suspended project? Has anyone faced a similar situation and found a faster resolution? Any guidance or sugg

MikroTik RouterOS 7.21.x PPP secret password not saved (users appear disabled)

3 May 2026 @ 9:43 am

I encountered a bug in MikroTik RouterOS 7.21.x where PPP secret passwords were not being saved correctly. When creating or editing PPP users (especially for SSTP), the password field did not persist. Even after setting the password via CLI or WinBox, the user would appear with the flag X - disabled in /ppp secret print. Authentication failed because the password was effectively not stored. Other fields such as service, profile, and comment were saved correctly, which suggested the PPP database itself was functioning. The problem persisted after reboot and occurred for every newly created PPP secret. Example steps to reproduce (RouterOS 7.21.4): /ppp secret add name=testuser password=test123 service=sstp profile=default /ppp secret print detail where name="testuser" Observed result: The user appears disabled (X - disabled) and the password does not appear to be

Confusion about php-fpm permissions with SELinux

2 May 2026 @ 12:34 pm

I recently set up a fedora 44 server in a home lab. I started Apache on it and installed php and php-fpm. I put in /var/www/html a PHP website (SPIP). All the files and folders of the website are owned by the apache user and have the security context system_u:object_r:httpd_sys_content:s0, except a few folders that have the system_u:object_r:httpd_sys_rw_content:s0 context. I wanted to check if SELinux was indeed limiting the actions of an intruder should the worst happen. In order to test this, I put a simple webshell at the base of the /var/www/html folder. It calls the PHP function system with whatever you sent to the webshell as an argument. The webshell has the same security context as the other files. To my surprise, the webshell runs smoothly, I can call binaries like sleep or touch. I had a look at the process tree and noticed that, when a command is

Technical Support Summary: Cross-Org Project Migration Failure [closed]

2 May 2026 @ 4:48 am

User Identity: [email protected] (and [email protected]) Source Project: sbr-coach-prod (Project Number: 8943596778866) Destination Org: beaconsfield-enterprises.com (Org ID: 13164570922) The Issue Attempting to migrate the project sbr-coach-prod from a "No Organization" (standalone) state into the Beaconsfield Organization. Despite having all required IAM roles and modifying Organization Policies, the move fails with Permission Denied (error: resourcemanager.projects.update). Steps Already Taken IAM Roles Assigned (Destination Org Level) The following roles were granted to the Beaconsfield identity at the Organization level: Organization Administrator Project Creator Project Mover Folder Admin Project Billing Manager IAM Roles Assigned (Project Level) To satisfy the "handshake," the Beaconsfield identity was invited to the sbr-coach-prod pro

Docker pull net/http: TLS handshake timeout on raspberry pi 1 (constrainted hardware)

1 May 2026 @ 3:48 pm

I face the following error while trying to pull an image error pulling image configuration: Get "https://docker-images-prod.6aa30f8b08e16409b46e0173d6de2f56.r2.cloudflarestorage.com/registry-v2/docker/registry/v2/blobs/sha256/e1/e1ace0ff02a53cac14dcec3a648b8b36e7212da8bdfc152442efbde66b70bc36/data?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=f1baa2dd9b876aeb89efebbfc9e5d5f4%2F20260501%2Fauto%2Fs3%2Faws4_request&X-Amz-Date=20260501T152452Z&X-Amz-Expires=1200&X-Amz-SignedHeaders=host&X-Amz-Signature=e95252d07f6684c971f1d9706232fda6279a02fd0efacf7268d6393ff604c66a": net/http: TLS handshake timeout

Rewrite rules to remove www for secure and non secure but it's not working

1 May 2026 @ 10:49 am

I spent a lot of time defining these rules but they are not working. Something is wonky. I have 2 a records on my first host (which is not hostinger) that point www.automation.MYDOMAIN.com as well as automation.MYDOMAIN.com to the IP of my VPS on Hostinger. I verified that the DNS for both A records all point properly to hostinger and are resolved properly. Pinging works and all is good. I am not using directories because i am just connecting my n8n interface running on port 5678 to the outside. What i want is very simple and i thought i had achieved it but it's not working properly. I want all my none secure requests whether with or without WWW to be redirected to the secure version of that url so that is why i configured this block: <VirtualHost *:80> ServerName automation.MYDOMAIN.com ServerAlias www.automation.MYDOMAIN.com Redirec

Keycloak won't start on Azure Container App - getting killed by probes

30 April 2026 @ 10:40 am

I'm trying to start up a productionised Keycloak on Azure Container Apps. As far as I can tell, its starting up fine but being shut down because of health probes thinking it isn't healthy. Here are the logs for the application which show it starting then being terminated ... Connecting to stream... 2026-04-30T10:26:06.64790 Connecting to the container 's175d01-ca-keycloak'... 2026-04-30T10:26:06.70026 Successfully Connected to container: 's175d01-ca-keycloak' [Revision: 's175d01-ca-keycloak--0000004', Replica: 's175d01-ca-keycloak--0000004-d95459d4b-7wfph'] 2026-04-30T10:25:58.6577656Z stdout F 2026-04-30 10:25:58,636 INFO [org.infinispan.CONTAINER] (main) ISPN000974: Virtual threads support: enabled 2026-04-30T10:25:59.7978463Z stdout F 2026-04-30 10:25:59,797 INFO [org.hibernate.orm.jdbc.batch] (JPA Startup Thread) HHH100501: Automatic JDBC statement batching enabled (maximum batch size 32) 2026-04-30T10:25:59.8935145Z stdout F 2026-04-30 10:25:59,893 WARN [io.

Setting up Hysteria 2 tunnel on 3X-UI + v2rayN (PC) [migrated]

29 April 2026 @ 6:10 pm

Goal: To bypass China's Great Firewall. Use Hysteria for all UDP traffic to increase speed for streaming videos and games. Then use VLESS for everything else (TCP). I got VLESS + Reality set up and working with help mostly from Gemini AI: 3X-UI on Ubuntu 24 on a Hong Kong server with CN2 GIA (optimized connection) to China No firewalls or security groups on the server v2rayN on Windows 11 But I want to take it the next step and also add Hysteria 2, but it's hard to get the correct info from AI and unfortunately there is very little info on setup guides (there are some Chinese videos, but no auto-translation). So far what I got for Hysteria 2 Inbound on 3X-UI: Port 4443 (3X-UI won't let me use 443 since VLESS is using that) I clicked "Set Cert from Panel" to fill in the public/private keys Everything else blank or default like blank SNI, uTLS=chrome, ALPN=h3, etc.

AWS PA-VM with GWLB gets no packets

24 April 2026 @ 1:39 pm

I have a Palo Alto PA-VM in AWS set up for a "bump-in-the-wire" firewall for traffic in the same region but different VPC and different account with a Gateway Load-Balancer (GWLB) in between. The short version of this question: does a proper GWLB setup (same region, different accounts) for a "hairpin", "bump-on-the-wire", "north-south" traffic inspection require extra pieces (such as a TGW or other intermediary step) for packets to actually reach the firewall? Is there another technical limitation I'm overlooking? I tried this same setup in my test environment first (all in the same region using different VPCs, main difference was everything on the same account) and it worked fine. I'm cheap, so I swapped the PA-VM for a Linux EC2 at that time. The current setup will have traffic moving as follows: random internet client --> IGW (data vpc) --> VPCendpoint (data vpc, for GWLB) --> GWLB (fw vpc) -->

Updating dynamically a resource record using DoT

15 April 2026 @ 2:09 pm

I am trying to update resource records on a primary DNS bind9 server from a client using nsupdate. There is no issue when using the default 53 port. An issue appears when using DoT (DNS over TLS) over the port 853. The primary DNS bind9 server configuration includes: # named.conf.options tls tls-configuration { cert-file "/path/to/full_chain_cert_file"; cipher-suites "list_of_cipher_suites"; key-file "/path/to/key_file"; prefer-server-ciphers yes; protocols { TLSv1.3; }; session-tickets no; }; options { ... listen-on port 853 tls tls-configuration { !172.16.0.0/12; any; }; listen-on-v6 port 853 tls tls-configuration { !fe80::/10; any; }; ... }; Verifying the DNS server certificate from the client: $ openssl s_client -conne

poundhost.com

VN:F [1.9.22_1171]
Rating: 6.7/10 (3 votes cast)

Cheap dedicated server hosting

tagadab.com

VN:F [1.9.22_1171]
Rating: 8.0/10 (1 vote cast)

Cheap developer VPS hosting from £10