| Commit message (Collapse) | Author | Age | Files | Lines |
| |
|
|
|
|
|
|
| |
of our forked apache possible by his work on nginx and slowcgi, but he
doesn't want it - so it is my pleasure to tedu it. I spent so much work
on chroot in it 10 years ago - and am very happy to see it go now, nginx
is a far better choice today.
Bye bye, Apache, won't miss you.
|
| |
|
|
|
|
|
|
| |
pointer or non-const array, as that minimizes the symbols, maximizes the
placement into read-only memory, and avoids warnings from gcc -Wformat=2
when they're used as format strings.
ok deraadt@
|
| |
|
|
| |
suggestions and ok millert@
|
| |
|
|
| |
ok kettenis@
|
| |
|
|
|
|
|
| |
an SSLCompression option so that it can be turned back on, however on
this is currently a no-op due to the compile options for libssl.
Requested by and ok djm@
|
| |
|
|
|
|
|
|
| |
named curve to use when generating ephemeral EC keys for an ECDHE-based
cipher suite, or can be set to `none' to disable. The default is to use
a prime256v1 curve.
yay^Wok djm@
|
| |
|
|
|
|
|
| |
works correctly as a boolean on/off flag. While here, rename the variable
so that it is consistent with existing naming scheme.
ok otto@ djm@
|
| |
|
|
| |
ok djm@ guenther@
|
| |
|
|
|
|
| |
compatability -> compatibility
OK jmc@.
|
| | |
|
| |
|
|
| |
for chars.
|
| |
|
|
| |
declared as integer types, not pointers, really.
|
| |
|
|
|
|
|
| |
used atoi(). this fix uses strtonum() instead.
from bjorn ketelaars, pr6515.
ok henning@
|
| | |
|
| |
|
|
|
|
|
|
| |
and update documentation accordingly.
Patch mostly based on an old patch from Martin Algesten he posted
2002 in apache bugzilla entry: 10772
OK, pyr@
|
| | |
|
| |
|
|
|
| |
'possibility', 'optins' -> 'options', 'resposne' -> 'response', 'unecessary' -> 'unnecessary', 'desination' -> 'destination'. Collected from various misc@
and tech@ postings, many by Brad Tilley.
|
| |
|
|
|
|
| |
noted by Vasiliy Kiryanov, thanks!
ok stephan@
|
| |
|
|
|
|
|
|
| |
with ProxyPreserveHost.
fixes pr6009, though i applied a different fix as what was suggested in that pr.
ok sthen@
|
| |
|
|
|
|
| |
report the correct size when it exceeds a long's capacity.
From Dan Harnett <daniel @ harnett . name>
|
| |
|
|
|
|
|
|
|
| |
unfortunately this backs out the use of strtonum and goes back to strtoll
will need more love in a future diff.
This fix from Dan Harnett <daniel @ harnett . name>
ok deraadt@
|
| |
|
|
|
|
|
|
|
| |
"on 64-bit platforms this allows remote origin servers to cause a
denial of service (daemon crash) or possibly execute arbitrary code
via a large chunk size that triggers a heap-based buffer overflow."
"looks good" to henning@
ok otto@
|
| | |
|
| | |
|
| | |
|
| | |
|
| |
|
|
|
| |
From Stephan A. Rickauer <stephan dot rickauer at startek dot ch> with
minor tweaks. ok by many.
|
| | |
|
| | |
|
| |
|
|
| |
from Josh Elsasser <josh@elsasser.org>, thanks.
|
| | |
|
| | |
|
| |
|
|
|
|
|
|
| |
port to be set in the config file instead of using HTTP_DEFAULT_PORT
in all cases. Prevent a segfault that would happen when the SSL
connection from the proxy fails.
Problem found and analyzed by Mischa Diehm; fix by me.
|
| |
|
|
| |
ok henning
|
| |
|
|
|
|
| |
markers.
no binary changes
|
| |
|
|
|
| |
not tested on them. Older gcc's require decl before code, and this
is supposed to be portable code in that sense.
|
| |
|
|
|
|
|
|
|
|
|
|
| |
existing installations. See the documentation for the IPv6 related
configuration.
This changes the module ABI since addresses are now struct addrinfo.
This has been tested by many people and run on production machines
for several months.
feedback many, ok todd
|
| | |
|
| |
|
|
|
|
|
| |
Use arc4random_uniform() when the desired random number upper bound
is not a power of two
ok deraadt@ millert@
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
A flaw was found in the mod_status module. On sites where mod_status
is enabled and the status pages were publicly accessible, a cross-site
scripting attack is possible. Note that the server-status page is
not enabled by default and it is best practice to not make this
publicly available.
Fix mod_imap XSS CVE-2007-5000:
A flaw was found in the mod_imap module. On sites where mod_imap
is enabled and an imagemap file is publicly available, a cross-site
scripting attack is possible.
ok miod@
|
| | |
|
| | |
|
| |
|
|
| |
ok pyr@, ray@, millert@, moritz@, chl@
|
| |
|
|
|
|
|
|
|
|
| |
A flaw was found in the mod_status module. On sites where the
server-status page is publicly accessible and ExtendedStatus is enabled
this could lead to a cross-site scripting attack. Note that the
server-status page is not enabled by default and it is best practice to
not make this publicly available.
ok miod@, henning@
|
| |
|
|
| |
PR5549, From: veins@evilkittens.org
|
| |
|
|
|
| |
overflow in SSL session id parsing (by reaching a negative size arg)
ok henning
|
| | |
|
| |
|
|
| |
ok deraadt millert
|
| |
|
|
|
|
|
|
|
| |
- Use sizeof(buf) instead of BUFSIZ.
- Only overwrite '\n'.
From Charles Longeau.
OK millert@ and moritz@.
|
| | |
|