Tag

TLS

0 views collected around this technical thread.

Aikesheng Open Source Community
Aikesheng Open Source Community
Apr 10, 2025 · Information Security

Securing MySQL Connections: SSL/TLS, Password Plugins, and Authentication

This article explains how to protect MySQL connections by using SSL/TLS, various password authentication plugins, digital signatures, and client/server certificate verification to prevent impersonation, password leakage, and data tampering.

AuthenticationMySQLPassword Plugin
0 likes · 11 min read
Securing MySQL Connections: SSL/TLS, Password Plugins, and Authentication
IT Services Circle
IT Services Circle
Apr 6, 2025 · Fundamentals

Comprehensive Guide to Technical Interview Topics: Signals, Process Synchronization, TLS Handshake, Caching Issues, Java Collections, Heap Construction, and Scheduling Algorithms

This article provides an extensive overview of core technical interview subjects—including operating‑system signals, process synchronization and data transfer methods, TLS encryption steps, common caching pitfalls and remedies, Java collection implementations, heap‑building algorithms, and various CPU scheduling strategies—offering concise explanations and practical code examples for each concept.

AlgorithmsInterviewJava
0 likes · 28 min read
Comprehensive Guide to Technical Interview Topics: Signals, Process Synchronization, TLS Handshake, Caching Issues, Java Collections, Heap Construction, and Scheduling Algorithms
Linux Ops Smart Journey
Linux Ops Smart Journey
Mar 10, 2025 · Cloud Native

How to Deploy Secure Kibana on Kubernetes Using Helm and Private Harbor

This guide walks you through the prerequisites, Helm chart acquisition, private Harbor upload, TLS secret creation, detailed Helm values configuration, and final deployment and verification steps to set up a secure, production‑ready Kibana monitoring platform on a Kubernetes cluster.

HarborHelmKibana
0 likes · 6 min read
How to Deploy Secure Kibana on Kubernetes Using Helm and Private Harbor
Xiaohongshu Tech REDtech
Xiaohongshu Tech REDtech
Mar 6, 2025 · Backend Development

ROFF: A High‑Performance Seven‑Layer Rust‑Based Gateway with TLS Offload, QUIC/HTTP3, and Dynamic Module System

ROFF is a Rust‑implemented, seven‑layer gateway that delivers high‑throughput load balancing with memory‑safe performance, TLS hardware offload, native QUIC/HTTP3 support, a hot‑reload/upgrade mechanism, and an extensible module system allowing over thirty built‑in filters and custom Rust macros.

HTTP/3Load BalancingModule System
0 likes · 28 min read
ROFF: A High‑Performance Seven‑Layer Rust‑Based Gateway with TLS Offload, QUIC/HTTP3, and Dynamic Module System
Linux Ops Smart Journey
Linux Ops Smart Journey
Feb 11, 2025 · Cloud Native

Deploy Elasticsearch on Kubernetes with Helm: Step‑by‑Step Guide

Learn how to containerize and deploy Elasticsearch using Helm on a Kubernetes cluster, covering chart download, certificate generation, secret creation, configuration files, and verification steps, enabling secure, scalable search capabilities in a cloud‑native environment.

DockerElasticsearchHelm
0 likes · 11 min read
Deploy Elasticsearch on Kubernetes with Helm: Step‑by‑Step Guide
Raymond Ops
Raymond Ops
Jan 12, 2025 · Information Security

Master SSL/TLS Certificates: Formats, Generation & OpenSSL Commands

This guide explains common certificate formats (PEM, DER, CRT, CER), shows how to generate a CA key, CSR, and signed certificate with OpenSSL, demonstrates format conversions, and provides commands for inspecting and verifying certificates, all essential for secure operations.

DEROpenSSLPEM
0 likes · 7 min read
Master SSL/TLS Certificates: Formats, Generation & OpenSSL Commands
Raymond Ops
Raymond Ops
Jan 4, 2025 · Information Security

Understanding SSL Mutual Authentication vs One‑Way: When and Why to Use It

SSL/TLS certificates secure data between browsers and servers, but while one‑way authentication verifies only the server, mutual (two‑way) authentication also validates the client using personal authentication certificates, requiring additional keys and CA roots, making it ideal for high‑security enterprise environments.

SSLTLScertificate
0 likes · 8 min read
Understanding SSL Mutual Authentication vs One‑Way: When and Why to Use It
macrozheng
macrozheng
Nov 5, 2024 · Information Security

How TLS Handshake Makes a Tiny GET Request Eat 1.68KB and How to Cut Bandwidth

After discovering that a simple GET request consumes 1.68 KB due to the TLS handshake, the article explains the handshake’s components, calculates the resulting bandwidth demand, and demonstrates how switching to HTTP or enabling Keep‑Alive can dramatically reduce traffic and server load in high‑concurrency scenarios.

BandwidthHTTPHTTPS
0 likes · 5 min read
How TLS Handshake Makes a Tiny GET Request Eat 1.68KB and How to Cut Bandwidth
IT Services Circle
IT Services Circle
Oct 22, 2024 · Information Security

Detailed Walkthrough of TLS 1.2 Handshake Using Wireshark

This article provides a step‑by‑step analysis of a TLS 1.2 HTTPS handshake captured with Wireshark, explaining the ClientHello, ServerHello, certificate parsing, key‑exchange messages, master secret derivation, and the final encrypted application data exchange.

HTTPSTLSTLS Handshake
0 likes · 14 min read
Detailed Walkthrough of TLS 1.2 Handshake Using Wireshark
Architecture Digest
Architecture Digest
Oct 14, 2024 · Information Security

Understanding TLS Handshake Overhead and Bandwidth Impact in High‑Concurrency Services

The article analyzes why a high‑concurrency data‑collection service quickly saturates a 100 Mbps uplink due to large TLS handshake payloads, demonstrates the bandwidth savings of switching to plain HTTP or using Keep‑Alive, and highlights practical considerations for secure versus performance‑optimized deployments.

BandwidthHTTPSTLS
0 likes · 4 min read
Understanding TLS Handshake Overhead and Bandwidth Impact in High‑Concurrency Services
Linux Ops Smart Journey
Linux Ops Smart Journey
Oct 5, 2024 · Cloud Native

How to Automate TLS Certificate Issuance with cert‑manager in Kubernetes

This tutorial explains how to use cert‑manager with a configured ClusterIssuer to automatically request, view, and clean up TLS certificates for both direct Certificate resources and Ingress objects in Kubernetes, including step‑by‑step commands, code examples, and best‑practice tips.

KubernetesTLScert-manager
0 likes · 11 min read
How to Automate TLS Certificate Issuance with cert‑manager in Kubernetes
Linux Ops Smart Journey
Linux Ops Smart Journey
Oct 1, 2024 · Cloud Native

Configure cert-manager Issuers & ClusterIssuers for Secure Kubernetes

This guide walks you through the fundamentals of cert-manager in Kubernetes, explaining the difference between Issuer and ClusterIssuer, and provides step‑by‑step commands to create self‑signed, CA, and ACME issuers, verify them, and reference official documentation for secure certificate automation.

ACMECAClusterIssuer
0 likes · 5 min read
Configure cert-manager Issuers & ClusterIssuers for Secure Kubernetes
Linux Ops Smart Journey
Linux Ops Smart Journey
Sep 27, 2024 · Cloud Native

How to Install and Configure cert-manager on Kubernetes with Helm

Learn step‑by‑step how to install Jetstack’s open‑source cert-manager on a Kubernetes cluster using Helm, from prerequisites and chart download to configuring TLS settings and deploying the service, ensuring secure inter‑service communication in cloud‑native environments.

HelmKubernetesTLS
0 likes · 6 min read
How to Install and Configure cert-manager on Kubernetes with Helm
Linux Ops Smart Journey
Linux Ops Smart Journey
Sep 26, 2024 · Cloud Native

Secure Your Kubernetes Ingress-Nginx with mTLS and HTTPS: Step‑by‑Step Guide

Learn how to configure Ingress‑Nginx in a running Kubernetes cluster for secure mTLS and HTTPS communication, covering prerequisites, certificate creation, deployment of HTTP and mTLS services, Ingress rules, SSL passthrough setup, and verification steps with practical kubectl and OpenSSL commands.

HTTPSIngress-NginxKubernetes
0 likes · 12 min read
Secure Your Kubernetes Ingress-Nginx with mTLS and HTTPS: Step‑by‑Step Guide
DevOps Operations Practice
DevOps Operations Practice
Sep 19, 2024 · Information Security

Understanding TLS Handshake Overhead and Bandwidth Impact in High‑Concurrency Services

The article analyzes why a high‑concurrency GET service quickly saturates a 100 Mbps uplink due to TLS handshake overhead, demonstrates bandwidth savings by switching to HTTP or using Keep‑Alive, and highlights practical considerations for secure connections.

BandwidthHTTPSTLS
0 likes · 5 min read
Understanding TLS Handshake Overhead and Bandwidth Impact in High‑Concurrency Services
Python Programming Learning Circle
Python Programming Learning Circle
Sep 6, 2024 · Information Security

Understanding HTTP, HTTPS, and How to Prevent Man‑in‑the‑Middle Attacks

This article explains the fundamentals of the HTTP protocol, illustrates its vulnerability to man‑in‑the‑middle attacks, demonstrates why plain HTTP is insecure, and shows how HTTPS, TLS/SSL, asymmetric encryption, and certificate authorities together protect communications from interception and tampering.

Certificate AuthorityEncryptionHTTP
0 likes · 9 min read
Understanding HTTP, HTTPS, and How to Prevent Man‑in‑the‑Middle Attacks
Selected Java Interview Questions
Selected Java Interview Questions
Sep 6, 2024 · Backend Development

Understanding TLS Handshake Overhead and Bandwidth Impact in High‑Concurrency Services

The article explains how TLS handshakes significantly increase request size and upstream bandwidth consumption in high‑concurrency services, demonstrates the bandwidth calculations, and proposes using plain HTTP or Keep‑Alive connections to reduce overhead and server load.

BandwidthHTTPHTTPS
0 likes · 4 min read
Understanding TLS Handshake Overhead and Bandwidth Impact in High‑Concurrency Services
Selected Java Interview Questions
Selected Java Interview Questions
Aug 10, 2024 · Information Security

Understanding HTTP, MITM Attacks, and How HTTPS Secures Communication

This article explains the fundamentals of the HTTP protocol, demonstrates how man‑in‑the‑middle attacks exploit its plaintext nature, discusses symmetric and asymmetric encryption attempts to mitigate these risks, and describes how HTTPS (TLS) and the CA trust model provide robust protection against such attacks.

EncryptionHTTPHTTPS
0 likes · 9 min read
Understanding HTTP, MITM Attacks, and How HTTPS Secures Communication
360 Smart Cloud
360 Smart Cloud
Aug 5, 2024 · Cloud Native

Understanding Kubernetes Ingress NGINX: Architecture, Configuration, and Reload Mechanisms

This article explains the purpose, architecture, configuration steps, TLS setup, validation, technical selection, controller operation, reload process, high‑availability design, customization options, and future roadmap of the Kubernetes Ingress NGINX solution for seven‑layer load balancing.

IngressKubernetesLoad Balancing
0 likes · 14 min read
Understanding Kubernetes Ingress NGINX: Architecture, Configuration, and Reload Mechanisms