Re: mod_proxy chaining with a .pac file

2008-01-24 Thread Ralf Mattes
On Wed, 2008-01-23 at 22:19 +, Giovanni Donelli wrote: Are you talking about a JS lib or a code that does what I need, support for .pac proxy chaning? The later. Sorry, that library wasn't linked to from your original post, but it can be found on the wikipedia page. Here's a direct link:

Re: mod_proxy chaining with a .pac file

2008-01-24 Thread Giovanni Donelli
Great. Thanks! This solve 50% of the problem. The other problem is to actually plug this into mod_proxy. Is there a hook a can use to override the connection to the remote server? What do you guys suggest? thanks! On Jan 24, 2008 12:50 PM, Ralf Mattes [EMAIL PROTECTED] wrote: On Wed,

Re: What am I doing wrong - site gen?

2008-01-24 Thread Joe Orton
On Wed, Jan 23, 2008 at 03:53:38PM -0800, William Rowe wrote: security/vulnerabilities-oval.xml I'm ending up with deltas such as these... -httpd_state xmlns=http://oval.mitre.org/XMLSchema/oval-definitions-5#apache; id=oval:org.apache.httpd:ste:131 version=1 comment=the version of

High security

2008-01-24 Thread Nick Gearls
Hello, As some may now, ModSecurity adds a very easy and effective way to put Apache in jail, but chrooting the process after its initialisation, thus putting all listening processes in jail. You specify one directive, and the only thing you have to put in the jail is your htdocs and logs

Re: High security

2008-01-24 Thread Colm MacCarthaigh
On Thu, Jan 24, 2008 at 01:10:23PM +0100, Nick Gearls wrote: You specify one directive, and the only thing you have to put in the jail is your htdocs and logs directories; all other files (conf, modules, httpd, libraries, etc.) are outside of the jail. This is really top security - it's

RE: High security

2008-01-24 Thread Plüm , Rüdiger , VF-Group
-Original Message- From: Colm MacCarthaigh [mailto:[EMAIL PROTECTED] Sent: Donnerstag, 24. Januar 2008 13:16 To: dev@httpd.apache.org Subject: Re: High security On Thu, Jan 24, 2008 at 01:10:23PM +0100, Nick Gearls wrote: You specify one directive, and the only thing you have

Re: svn commit: r614605 - in /httpd/httpd/trunk: include/util_ldap.h modules/ldap/util_ldap.c

2008-01-24 Thread Brad Nicholes
On 1/23/2008 at 7:25 PM, in message [EMAIL PROTECTED], Paul J. Reder [EMAIL PROTECTED] wrote: Ruediger Pluem wrote: On 01/23/2008 07:14 PM, [EMAIL PROTECTED] wrote: Author: rederpj Date: Wed Jan 23 10:14:41 2008 New Revision: 614605 URL: http://svn.apache.org/viewvc?rev=614605view=rev

Re: High security

2008-01-24 Thread Nick Gearls
Yes, chroot could potentially be escaped. Although, if you chroot the main process, then you spawn child processes under another userid, like in standard Apache config under Unix, I expect it to be really very difficult to escape if 1. you are not root 2. if the only files available are log

Certificate validation problems trapping - bug #35083

2008-01-24 Thread Nick Gearls
Hello, The proposed patch generalizes a mechanism that currently exist, but is incomplete. It now allows to accept all SSL connections that fail for any reason related to certificate verification or validation. Could this be included in next release ? This has a huge impact on the user, as

Re: What am I doing wrong - site gen?

2008-01-24 Thread William A. Rowe, Jr.
Joe Orton wrote: On Wed, Jan 23, 2008 at 03:53:38PM -0800, William Rowe wrote: security/vulnerabilities-oval.xml I'm ending up with deltas such as these... -httpd_state xmlns=http://oval.mitre.org/XMLSchema/oval-definitions-5#apache; id=oval:org.apache.httpd:ste:131 version=1 comment=the

Re: Is async the answer?

2008-01-24 Thread Olaf van der Spek
We were using normal worker MPM with keepalives for this test. The current stable event would have helped with idle keepalive threads, but the system didn't seem to care. But when using mod_php, worker is not recommended, right? I doubt prefork scales as well as worker. Working on making a

Re: High security

2008-01-24 Thread Ruediger Pluem
On 01/24/2008 04:55 PM, Nick Gearls wrote: Yes, chroot could potentially be escaped. Although, if you chroot the main process, then you spawn child processes under another userid, like in standard Apache config under Unix, I expect it to be really very difficult to escape if 1. you are

Re: svn commit: r614605 - in /httpd/httpd/trunk: include/util_ldap.h modules/ldap/util_ldap.c

2008-01-24 Thread Paul J. Reder
The referral code is enabled via set_option calls and is currently processed in relation to a newly created ldap connection. Any further directory related processing would have to support changing the options later, or provide extra criteria when selecting a connection to use. But I agree that,

Re: svn commit: r614605 - in /httpd/httpd/trunk: include/util_ldap.h modules/ldap/util_ldap.c

2008-01-24 Thread Graham Leggett
Paul J. Reder wrote: Now that you ask that question it makes me realize that the better question is probably Should the directives be directory scoped or server scoped? The rest of the util_ldap directives are all server scoped. The cache related ones are all server scoped, as the cache is