Le guide pour réduire ses impôts

2016-09-09 Thread Mail
    [  ]( http://r.email-mieux-depenser.com/5t9f8wg31awhcvd.html )    [ 
Réduire ses impôts ]( http://r.email-mieux-depenser.com/5t9f8wg3tqwhcvd.html )  
 [ pendant 6, 9 ou 12 ans ]( 
http://r.email-mieux-depenser.com/5t9f8wg4m6whcvd.html )   [ C'est possible ! 
]( http://r.email-mieux-depenser.com/5t9f8wg5emwhcvd.html )     [ En savoir + 
]( http://r.email-mieux-depenser.com/5t9f8wg672whcvd.html )   [  ]( 
http://r.email-mieux-depenser.com/5t9f8wg6ziwhcvd.html )          [ O € d’impôt 
pendant 6 à 12 ans tout en devenant propriétaire ]( 
http://r.email-mieux-depenser.com/5t9f8wg7rywhcvd.html )          [ Demandez 
votre simulation gratuite
et recevez le guide Loi Pinel ]( 
http://r.email-mieux-depenser.com/5t9f8wg8kewhcvd.html )     [ - Explications
- Conseils pratiques
- Exemples ]( http://r.email-mieux-depenser.com/5t9f8wg9cuwhcvd.html )   [  ]( 
http://r.email-mieux-depenser.com/5t9f8wga5awhcvd.html )          [ >>  Votre 
simulation et guide complet en 30 secondes  << ]( 
http://r.email-mieux-depenser.com/1xr52ytd2lawhcvd.html )       



Website maintenance

2016-09-09 Thread shan
Addressed To

 

Greetings For the Day,

 

Hope all is going well!

 

I am Bhushan, SEO Professional.

 

Are you looking to increase ROI through Your Website Maintenance:
www.formilux.org

 

You got a nice website but why are you missing out Over Search engine
optimization and social media management. The research released by major
online research firms confirm search engine as the best source of getting
information and making a purchase decision for most the people and this
trend is continuously growing. 

 

We are a small bunch of Professionals who are experts in website
optimization, designing, SMM, Search Engine Marketing and Online Business
Optimization. 

 

We will be glad to assist you by offering our services. Give us a chance to
see what we can do for Your Website Maintenance and business. We won't take
you through binding contract unless you are absolutely happy with our work 

 

We will be glad to hear from you if you got any requirements for Your
Website Maintenance. We will share all our methods of promotions, all our
client testimonials, service fee, past work details etc for your reference.

 

 

We have expertise in the following areas:-

 

. Online Marketing,

. Website maintenance,

. Easy Web Solution,

. Web Site Promotions.

. Flash Website Design

 

 

I look forward to hear from you!

 

 

 

Kind Regards,

Bhushan

SEO Professional

Karol Bagh

New Delhi (India)

 

 

Kindly reply back with "unsubscribe" to us if you don't wish to receive any
emails from us in future.

 

 



Re: Issue with configuration reload and frontend certificates

2016-09-09 Thread Marco A. Carcano
Hi Lukas

by the way I found this very strange, however you are right, it seems that 
pacemaker left old haproxy instances alive (I moved the service between the 
nodes to simulate a shutdown on one node) - I didn’t noticed this, as it should 
kill every instance on one node before starting them on another node.

after moving the resource to another node, killing the survived instances and 
moving the service back to the node everything seems working properly.

sorry for the wrong report

cheers

Marco

> On 09 Sep 2016, at 12:31, Lukas Tribus  wrote:
> 
> Ciao Marco,
> 
> 
> I assume the old process did not get the signal and continues to serve 
> requests with the old configuration.
> 
> Can you confirm the number of haproxy processes running is more than you 
> expect? Are you using nbproc or single process mode (the latter is the 
> default)?
> 
> 
> Does the PID file contain the correct PID?
> 
> 
> If the old haproxy instance is not getting the signal it will continue to 
> serve requests and the kernel will load-balance between the old and the new 
> instance, leading to the behavior you are describing.
> 
> 
> 
> We really need an no-reuseport knob to confirm those kinds of issues...
> 
> 
> Regarding the actual problem, I would suggest to upgrade to latest stable 
> release 1.6.9 first of all. Then we can actually start troubleshooting, but 
> there are important bugfixes in those 4 releases.
> 
> 
> 
> cheers,
> 
> lukas
> 
> 




Re: Issue with configuration reload and frontend certificates

2016-09-09 Thread Lukas Tribus

Ciao Marco,


I assume the old process did not get the signal and continues to serve 
requests with the old configuration.


Can you confirm the number of haproxy processes running is more than you 
expect? Are you using nbproc or single process mode (the latter is the 
default)?



Does the PID file contain the correct PID?


If the old haproxy instance is not getting the signal it will continue 
to serve requests and the kernel will load-balance between the old and 
the new instance, leading to the behavior you are describing.




We really need an no-reuseport knob to confirm those kinds of issues...


Regarding the actual problem, I would suggest to upgrade to latest 
stable release 1.6.9 first of all. Then we can actually start 
troubleshooting, but there are important bugfixes in those 4 releases.




cheers,

lukas




Re: [PATCH] New DNS parser

2016-09-09 Thread Pavlos Parissis
On 08/09/2016 09:50 μμ, Baptiste wrote:
> Hi all,
> 
> Please find in attachment 10 patches to cover the following new topic in 
> HAProxy:
> 
> 1. a new DNS parser, which stores the DNS response into a DNS structure, 
> instead
> of manipulating a buffer.
> => it doesn't add any feature by itself, but it will make DNS consumer tasks 
> much
> easier when using DNS responses
> 
> 2. when the DNS response finishes with a CNAME, now HAProxy sends a new query,
> changing the query type (from  to A or A to )
> 
> I heavily tested the code, but I'd like more people to test it in their own
> environment.
> 
> We can now move forward on the next big development: filling servers in a 
> backend
> based on records read in a DNS responses.
> 
> Conrad: I have a quick and dirty and not finished patch to read and store SRV
> records. If you want to use it for your own dev, please let me know.
> 
> Baptiste

I'm also super excited about this patch set and the fact it will lead to an easy
and fast integration with docker world.

Thanks a lot Baptiste for your hard work,
Pavlos



signature.asc
Description: OpenPGP digital signature


[no subject]

2016-09-09 Thread sjamngn
Hi Customer,  If you can not see the description below, please click here. 如無法閱讀以下的內容,請按此.To learn more, please visit www.printing100.com. 想了解多D請到www.printing100.com  9月啦,系時候要印月曆.利是封啦! 我司有多款訂制月曆.利是封選擇, 可適合不同客人訂制要求.9月1日前落單即可享有9.5折優惠!  座檯月曆年曆咭Red pocketDesktop calendarCalendar card 利是封  Chinese  calendar  福字月曆   Desktop calendar座檯月曆    Chinese calendar福字月曆    Red pocket利是封   本司提供多個款式掛曆檯曆。既美觀又耐用。客戶可以通過自助設計系統可以自行上傳圖片和修改圖片的位置,自己動手,自己當設計師,當一把設計癮,設計出特色檯挂曆,按客戶要求可加公司名字,LOGO,便於公司派發,使用新一年新氣象,月曆當然必須辭舊迎新,多種款式、多種工藝的月曆可讓客戶多種選擇。色彩華麗,瑞氣滿盈,寓意吉祥。我司推出自訂特色利是封,新年利是封, 結婚回禮封,用途多多,少至私人用(200-300個),多至企業推廣(1000-5000個).可選擇彩色印刷或傳統花紋紙加燙金效果。歡迎  諮詢Hot Line :82007559Email:sa...@printing100.com   其他產品資訊  If our promotional email  have causing you any disturbance, please email(promot...@printing100.com)  and acknowledge us for cancelation of the mailing list. 如此郵件對閣下帶來騷擾, 請以EMAIL(promot...@printing100.com) 通知我們



[PATCH] Fix OSX compilation errors

2016-09-09 Thread Dinko Korunic
Hi,

The following really trivial patch fixes compilation issues on OSX (El
Capitan at least).


Kind regards,
D.


0001-BUG-MINOR-fix-osx-compilation-errors.patch
Description: Binary data


Re: [PATCH] New DNS parser

2016-09-09 Thread Conrad Hoffmann
Hi Baptiste,

I'm super excited :) Unfortunately, I'll be on vacation for three weeks,
beginning this weekend, so I won't be able to provide any feedback before I
get back. But I will give it test ride immediately after.

Thanks so much,
Conrad

On 09/08/2016 09:50 PM, Baptiste wrote:
> Hi all,
> 
> Please find in attachment 10 patches to cover the following new topic in
> HAProxy:
> 
> 1. a new DNS parser, which stores the DNS response into a DNS structure,
> instead of manipulating a buffer.
> => it doesn't add any feature by itself, but it will make DNS consumer
> tasks much easier when using DNS responses
> 
> 2. when the DNS response finishes with a CNAME, now HAProxy sends a new
> query, changing the query type (from  to A or A to )
> 
> I heavily tested the code, but I'd like more people to test it in their own
> environment.
> 
> We can now move forward on the next big development: filling servers in a
> backend based on records read in a DNS responses.
> 
> Conrad: I have a quick and dirty and not finished patch to read and store
> SRV records. If you want to use it for your own dev, please let me know.
> 
> Baptiste
> 

-- 
Conrad Hoffmann
Traffic Engineer

SoundCloud Ltd. | Rheinsberger Str. 76/77, 10115 Berlin, Germany

Managing Director: Alexander Ljung | Incorporated in England & Wales
with Company No. 6343600 | Local Branch Office | AG Charlottenburg |
HRB 110657B



Issue with configuration reload and frontend certificates

2016-09-09 Thread Marco A. Carcano
Hi all,

I’m facing this weird behaviour so I report you for further investigation. I’m 
using haproxy 1.6.5

I’m trying to automate X.509 certificate replacement of haproxy frontends while 
they expires, so I wrote a script that simply generate the new PEM and issue a 
reload to haproxy.

Reload command the script give is 

haproxy -f /etc/haproxy/haproxy.cfg -p /var/run/haproxy.pid -sf $(cat 
/var/run/haproxy.pid)

now the weird thing:

it seems that haproxy is somehow caching the old certificate: this is what 
happens if I connect from another host: (I used 2 different certificates to 
make it evident: the old one was *.itc4u.ch, the new one is 
apache-2.prod.itc4u.local - but I suppose this should happen even when 
replacing an expiring certificate with a new one)

openssl s_client -connect apache-2.prod.itc4u.local:443
CONNECTED(0003)
depth=2 C = US, O = DigiCert Inc, OU = www.digicert.com, CN = DigiCert Global 
Root CA
verify return:1
depth=1 C = US, O = DigiCert Inc, CN = DigiCert SHA2 Secure Server CA
verify return:1
depth=0 C = CH, ST = TI, L = Pregassona, O = ITC4u Sagl, CN = *.itc4u.ch

after a few executions

openssl s_client -connect apache-2.prod.itc4u.local:443
CONNECTED(0003)
depth=1 O = ITC4U.LOCAL, CN = Certificate Authority
verify return:1
depth=0 O = ITC4U.LOCAL, CN = apache-2.prod.itc4u.local

and after other executions again 

openssl s_client -connect apache-2.prod.itc4u.local:443
CONNECTED(0003)
depth=2 C = US, O = DigiCert Inc, OU = www.digicert.com, CN = DigiCert Global 
Root CA
verify return:1
depth=1 C = US, O = DigiCert Inc, CN = DigiCert SHA2 Secure Server CA
verify return:1
depth=0 C = CH, ST = TI, L = Pregassona, O = ITC4u Sagl, CN = *.itc4u.ch

this seems to be randomly happening

The more weird thing is that it seems to happen even if I stop haproxy and 
start it again

As I’m using a clustered environment (but it is an active/hot standby), e even 
checked haproxy log files and each time I receive a reply from the same cluster 
node (that actually is the only active one) I get it logged, so I’m absolutely 
sure replies always comes from the same node

In order to ensure that is not something related to openssl s_client, I tried 
with firefox, and got exactly the same behaviour

Kind regards

Marco Carcano