Latest Server related questions

Score: 0
Custom ubuntu package compiled locally says upgrade available even though what's in the repo is the same version
nl flag

I have obtained the source package for one of the things installed on my Ubuntu system, made a change to the source code, built a binary package, and installed it.

Now that package ALWAYS shows up in the list of upgradable packages, even though what's in the repo is the exact same version.

I have put a hold on that package, which works ... but I don't want to see that package in the list of upgradab ...

Score: 0
Handling a long URL in a 302 redirect on nginx
cn flag

I have a URL shortener tool running on nginx (1.20.0), that redirects to various URLs using a simple 302 Redirect (Django redirect shortcut, to be precise, which sends a 302). I noticed that with a particular URL (over 3850 bytes in total), nginx refuses to send the 302, and returns a 502 error instead.

It seems like this is a server configuration issue. Where can I adjust the maximum size of the 302? ...

Score: 0
Infinite loop of BN_mod_sqrt not resolved after updating openssl in Ubuntu
sy flag

as I mentioned; I updated my openssl version to 1.1.1-1ubuntu2.1~18.04.15 and followed the code mentioned in github.com/drago-96/CVE-2022-0778 to verify if it is fixed. But it's going into an infinite loop. Do I need to update any other package? Or not linking something properly?

Edit: could verify the fix after I did "apt upgrade". That means some other package also needs to be updated. Don't kn ...

Score: 0
Jeremy Beale avatar
Image pull bug when using multi-OS Docker repo together with multi-OS Kubernetes cluster
ca flag

Our company's Kubernetes cluster recently started experiencing Docker image pull errors after AKS update of K8s versions (1.21.9 to 1.22.6). No changes were made to cluster config. Apparently the cluster no longer handshakes correctly with all Docker registries. If any Windows nodes are present in the cluster, image pull always defaults to the Windows version of the image, even though the repo also cont ...

Score: 0
Why can I use more licenses in M365 than purchased?
jp flag

In my Microsoft 365 admin center, I can see:

Assigned licenses: 3 Purchased licenses: 1

I checked the invoices and I am indeed charged for only one license.

How is that possible?

Score: 0
user227963 avatar
How to filter and deliver a message in Procmail
in flag

I rewrite the subject line for certain incoming mails depending on TO: field:

:0fhw
* ! ^TO_user@domain\.com\>
* ^TO_[^<>@ ]+@domain\.com\>
* ^Subject:\/.+
| /usr/local/bin/formail -I"Subject: [SPAM]$MATCH"

The above code (from my earlier question procmail rewrite subject line if email recipient user fails match test) works perfectly - if I get mail from something OTHER THAN user@domain ...

Score: 0
Dmitry avatar
AWS Site-to-Site VPN with BGP - how routes are advertized via BGP?
jp flag

I've configured redundant site-to-site VPN between AWS and GCP with 2 VPN connections, 4 tunnels and BGP dynamic routing. Everything works, all good, servers on both sides of the tunnels can reach each-other.

I did that using Terraform and if on GCP side I did configured advertisement of all subnets:

  name    = "gcp-to-aws-router"
  project = google_project.aws_gcp_test.project_id
  region  = var.gcp ...
Score: 0
controlling apache target using cookie
in flag

I have an apache web server with authentication based on mod_mellon mode (IDP OKTA).

Authentication is done only on the Uri "/example". Everything is OK on authentication. Post-authentication, the application (php) adds a specific cookie to the browser. I want to do a proxy-pass (internal redirect) on a specific vhost when I detect the presence of the cookie. With a rewrite cond, the redirection  ...

Score: 0
Tom avatar
How to analyze/monitor OSSEC logs on Ubuntu
bf flag
Tom

I'm using OSSEC server to monitor machines with OSSEC agents, which monitor this login via SSH, file creation, etc.

I have configured OSSEC to send an email when it detects a problem, but this control mode is very bad for data control and search.

How can I analyze the logs like a dashboard, all log occurrences? Analyze by type of threat, date of occurrence, etc.

Score: 0
Tobia avatar
How can I understand if my MX is changing the message envelope?
in flag

I have an exim4 server that forwards all input emails to a gmail account.

Gmail is refusing some valid messages with this error:

SMTP error from remote mail server after end of data: 550-5.7.1 Our system has detected that this message is likely unsolicited mail. To reduce the amount of spam sent to Gmail,this message has been blocked. Please visit https://support.google.com/mail/?p=UnsolicitedMe ...

The Stunning Power of Questions

Much of an executive’s workday is spent asking others for information—requesting status updates from a team leader, for example, or questioning a counterpart in a tense negotiation. Yet unlike professionals such as litigators, journalists, and doctors, who are taught how to ask questions as an essential part of their training, few executives think of questioning as a skill that can be honed—or consider how their own answers to questions could make conversations more productive.

That’s a missed opportunity. Questioning is a uniquely powerful tool for unlocking value in organizations: It spurs learning and the exchange of ideas, it fuels innovation and performance improvement, it builds rapport and trust among team members. And it can mitigate business risk by uncovering unforeseen pitfalls and hazards.

For some people, questioning comes easily. Their natural inquisitiveness, emotional intelligence, and ability to read people put the ideal question on the tip of their tongue. But most of us don’t ask enough questions, nor do we pose our inquiries in an optimal way.

The good news is that by asking questions, we naturally improve our emotional intelligence, which in turn makes us better questioners—a virtuous cycle. In this article, we draw on insights from behavioral science research to explore how the way we frame questions and choose to answer our counterparts can influence the outcome of conversations. We offer guidance for choosing the best type, tone, sequence, and framing of questions and for deciding what and how much information to share to reap the most benefit from our interactions, not just for ourselves but for our organizations.