When updating the source tree via anonymous cvs, I keep getting this ...
...
cvs update: move away regress/lib/libssl/symbols/Makefile; it is in the way
C regress/lib/libssl/symbols/Makefile
cvs update: move away regress/lib/libssl/symbols/symbols.awk; it is in the way
C regress/lib/libssl/symbols
Why does 'cvs diff -D...' on the OPENBSD_7_2 branch
include changes from before the given date?
# cvs -qd anon...@anoncvs.spacehopper.org:/cvs checkout -rOPENBSD_7_2 -P
src/usr.sbin/httpd
U src/usr.sbin/httpd/Makefile
U src/usr.sbin/httpd/config.c
U src/usr.sbin/httpd/control.c
U src/usr.sbin/htt
On 2022-02-17 18:56, Stuart Henderson wrote:
> On 2022-02-17, Matthias Pressfreund wrote:
>> On a server with 3 LAN interfaces (re0/1/2):
>> * re0 connected to the ISP
>> * re1 connected to the internal network
>> * re2 so far unused
>>
>> I was settin
On a server with 3 LAN interfaces (re0/1/2):
* re0 connected to the ISP
* re1 connected to the internal network
* re2 so far unused
I was setting up pf queues for bandwidth control as follows:
* one queue on re0 for outgoing traffic
* another queue on re1 for incoming traffic
Now, I would like to
The patch below removes a log_warn in case the server does not find
a custom error page as this is nothing to warn about (either because
the generic template file [err.html] is used or fallback to built-in
pages is intended). It also removes two unnecessary assignments and
adapts the comment to the
Since the Oct 22 patch, I experienced two crashes of httpd.
After I rollback, everything runs stable again.
I had no time to dig deeper into yet, so this is just to
notify that the patch might have caused some unexpected
side effects.
On 2021-10-21 16:38, Sebastian Benoit wrote:
>
> This diff makes httpd return "505 HTTP Version Not Supported"
> for < 0.9 and > 1.9 http versions. Anything from 1.1 to 1.9 is
> interpreted as 1.1. This is what nginx does too.
I don't understand why an invalid HTTP version sent by the client
sho
Hi,
maybe that would serve your purposes:
https://github.com/mpfr/pftbld
On 2021-10-18 00:24, J. K. wrote:
> Hi,
>
> Is there an existing library for pf(4) which includes
> the same features like pfctl? Or at least add IP addresses
> to a specific block table?
>
> Want to build a some sort of
On 2021-06-19 16:24, Kent Watsen wrote:
>
> Perfect, but I’m hesitant to use without long-term viability.
Since I have no plans to give up OpenBSD, you shouldn't worry
too much about this.
>
> Any plan for merging into base?
I don't have that in my hand.
Have you tried this?
https://github.com/mpfr/httpd-plus#custom-error-documents
On 2021-06-19 07:26, Kent Watsen wrote:
> This is incredibly basic, but after reading httpd.conf(5) and random web
> searches, I’ve been unable to determine how to customize the default failed
> login page (from th
You could try this: https://github.com/mpfr/pftbld
It uses pf tables instead of anchors to achieve the same goal.
Handling sshd abusers may be accomplished by first using pf source-tracking
to catch them. For example:
-
table persist
block in quick from
pass in on egress proto tcp to egres
11 matches
Mail list logo