Ian Holsman wrote:
While open source is fantastic, and provides highly visible means.
It can still be hacked.
I can describe what has happened in this case:
1. joe hacker hacks one of the 'open source groups' machines.
at this point he is assumed to have access to the source code
Julian Reschke wrote:
Guenter Knauf wrote:
Hi,
just another compression utility is going to become very popular:
http://www.7-zip.org/
and there's also a commandline for Unix / Win32:
http://sourceforge.net/projects/p7zip/
maybe we should add the .7z extension to the httpd mime.types file?
William A. Rowe, Jr. wrote:
An example document, /dist/httpd/httpd-2.2.6.tar.gz is requested and
...
Best I can figure, this is really application/x-tar+x-gzip (or would
that be application/x-gzip+x-tar?) if we don't want to (and we don't
want to) advertise the content stream as gzip'ed
William A. Rowe, Jr. wrote:
There seems to be troubles in paradise. cc'ing httpd who had
recently updated mime-types.
Best I can figure, this is really application/x-tar+x-gzip (or would
that be application/x-gzip+x-tar?) if we don't want to (and we don't
want to) advertise the content
Nick Kew wrote:
On Mon, 06 Aug 2007 00:50:59 -0400
Nikolas Coukouma [EMAIL PROTECTED] wrote:
Right now the inflate filter only checks to see if the
Content-Encoding in the headers table contains gzip. It does not check
r-content_encoding. This breaks it with mod_mime (among other
things
Right now the inflate filter only checks to see if the Content-Encoding
in the headers table contains gzip. It does not check
r-content_encoding. This breaks it with mod_mime (among other things).
The fix is straightforward enough, and I've attached a patch to the bug.
I've tested it to (try to)