Friday, May 19, 2023

ChimeSDK with Asterisk

This workshop steps you through how you can use ChimeSDK as a SIP trunk provider and utilize ChimeSDK Call Analytics.

 Using Amazon Chime Call Analyitcs (

Thursday, May 18, 2023

New SES Blogposts on AWS blog!

I recently went through the pain of migrating my personal email to a new provider and these blogs discuss best practices around email security and explore email authentication methods utilizing DKIM, DMARC, and SPF.

If you plan to engage with your customers via email, take a look at these practices to reduce email bounce backs and add policies to make your email more trustworthy.

This blog by Dustin Taylor explains three widely used email authentication mechanisms: SPF (Sender Policy Framework), DKIM, and DMARC (Domain-based Message Authentication, Reporting and Conformance). SPF checks which IP addresses are authorized to send mail on behalf of a domain, DKIM allows a domain to attach its identifier to a message using cryptographic techniques, and DMARC combines SPF and DKIM to detect email spoofing.

The blog by Jesse Thompson and @komaio discusses the importance of selecting the right domain for optimal deliverability when using Amazon Simple Email Service (SES). It explains that using a domain identity instead of an email address identity is crucial for achieving the best deliverability rates.

The blog by Vinay Ujjini discusses the importance of email authentication and focuses specifically on DKIM (DomainKeys Identified Mail). It explains that email authentication is the process of verifying the authenticity of an email message to ensure it is sent from a legitimate source and hasn't been tampered with. DKIM is one of the widely used email authentication mechanisms.

Monday, May 8, 2023

EC2 automated port open/close for ACME

I wrote this script to enable port 80 during my ACME renewal of my TLS certificates. This obviously only works on EC2 hosts, but it is still useful.
# Get current instance ID
INSTANCE_ID=$(curl -s
# Get current Security Group ID
SECURITY_GROUP_ID=$(aws ec2 describe-instances --instance-ids $INSTANCE_ID --query 'Reservations[].Instances[].SecurityGroups[].GroupId' --output text)
# Allow incoming traffic on port 80
aws ec2 authorize-security-group-ingress --group-id $SECURITY_GROUP_ID --protocol tcp --port 80 --cidr
# Sleep for 30 minutes
sleep 1800
# Remove incoming traffic on port 80
aws ec2 revoke-security-group-ingress --group-id $SECURITY_GROUP_ID --protocol tcp --port 80 --cidr

Disable/Enable network interfaces on Windows

If you are like me, you often need to disable and re-enable interfaces on your windows machine to test out new networks, etc. I find that Microsoft keeps hiding the ethernet settings deeper and deeper in menus, so I decided to start utilizing Powershell to do this. Powershell isn't my strength, but it is useful.

Open up PowerShell as Administrator and run the following:

Disable-NetAdapter -Name "Adapter Name" 
Enable-NetAdapter -Name "Adapter Name"