Nginx 1.10.1,2
FreeBSD 10.2-RELEASE-p18 #0: Sat May 28 08:53:43 UTC 2016
I'm using the "map" module to detect obvious hacking by detecting
keywords. (Yes, I know about Naxsi.) Finding the really dumb hacks is
easy. I give them a 444 return code with the idea being I can run a
script on the log
Hi,
I'm running nginx v1.9.10 on OpenBSD with the following server definition:
server {
listen 80;
server_name example.com;
location / {
deny all;
limit_except POST {
allow all;
proxy_pass http://10.1.2.3;
}
proxy_set_header
hello there
i have nginx newly installed as reverse proxy infront of apache
but i found a strange problem
when i try to login to open cart control panel it keeps redirecting me to
control panel without enabling me to login
the authentication informations that i used are correct & after i have
Hello!
On Thu, Aug 18, 2016 at 07:46:29PM -0700, Piotr Sikora wrote:
> Hey Maxim,
>
> > Calling SSL_get_peer_certificate() is only needed if
> > SSL_get_verify_result() returns X509_V_OK, to distinguish two of
> > its different meanings:
> >
> >X509_V_OK
> >The verification
Have you read over
https://www.nginx.com/blog/mitigating-the-httpoxy-vulnerability-with-nginx/?
On Sun, Aug 21, 2016 at 1:53 PM, Hamza Aboulfeth
wrote:
> Hello everyone,
>
> I finally understand what's going on here...
>
>
Hello everyone,
I finally understand what's going on here...
http://www.trendmicro.com/vinfo/us/threat-encyclopedia/vulnerability/10236/python-http-proxy-header-injection-vulnerability-cve20161000110
I have been a victim of this attack, nginx is also affected, is there
any patch for this new