On 11/30/2016 09:17 AM, Lukas Tribus wrote:
Does it cause warnings in the webmaster tools? Who cares?
Does it affect your ranking? I doubt it.
Does it index pages or error pages from the default website and assign to
your website? I doubt that even more.
Does it upset my customer? YES.

That's all the justification I need.
That's fine, then why not just say that?
Why should I? I clearly defined the problem/misconfiguration. I don't really see the need to justify why I want to fix it.

Instead you pretended to know about a huge problem with (a) crawler(s) that
would probably have affected every third website. That would have been a huge
deal, that everyone wanted to know about, if real.
No. I said this would affect anyone using a mixed http/https setup over SNI. I also said it was something I hadn't thought of, and as such was a cock up in my configuration.

If you come on this mailing list claiming you can remotely crash every nginx
instance, most likely people would like to clarify specifics and fix the 
problem,
don't you think?
If I did make that claim, I'd describe exactly how I just crashed nginx.org. Of course I'd do that privately...
Interestingly, there are many posts on this subject, try googling them.



Feel free to disagree but I really did put up a request for suggestions
on how people solve this problem,  not to have a philosophical debate on
the matter.
What I wanted to know is if there is a major bug in one of the crawlers, which
is more or less what you suggested. Now we know its not, and that's great,
because that means SEO is not fucked up for millions of websites out there
in a very common configuration.
Well, you told me it doesn't happen... WTF?
IT WILL CRAWL THE DEFAULT HTTPS: TARGET IF ALLOWED.
I'll leave you to do your own research if you don't believe me. Ass-u-me.

Besides, I did provide suggestions about the only way to handle this in nginx
(return specific error codes or certificates from the default server block) and
what would be ideal instead (aborting the TLS handshake like haproxy does
with strict-sni enabled).
And what cert would you use in this default block that matches, so the crawler receives a meaningful response, rather than an incorrect cert ( which they don't like )? I'm plenty old enough to realise I'll never know everything, and if my knowledge is deficient in this field, please show me where, or point me to where I can research further.



lukas

Time to stop feeding the troll I think.

Steve

--
Steve Holdoway BSc(Hons) MIITP
http://www.greengecko.co.nz
Linkedin: http://www.linkedin.com/in/steveholdoway
Skype: sholdowa

_______________________________________________
nginx mailing list
nginx@nginx.org
http://mailman.nginx.org/mailman/listinfo/nginx

Reply via email to