<feed xmlns='http://www.w3.org/2005/Atom'>
<title>nginx.git/src/core, branch release-1.3.14</title>
<subtitle>nginx</subtitle>
<link rel='alternate' type='text/html' href='https://git.sigsegv.uk/nginx.git/'/>
<entry>
<title>Version bump.</title>
<updated>2013-02-19T17:45:12+00:00</updated>
<author>
<name>Valentin Bartenev</name>
<email>vbart@nginx.com</email>
</author>
<published>2013-02-19T17:45:12+00:00</published>
<link rel='alternate' type='text/html' href='https://git.sigsegv.uk/nginx.git/commit/?id=a98305e363444d8df8844416663a0889c2edfa8d'/>
<id>a98305e363444d8df8844416663a0889c2edfa8d</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Added support for {SHA} passwords (ticket #50).</title>
<updated>2013-02-07T12:09:56+00:00</updated>
<author>
<name>Maxim Dounin</name>
<email>mdounin@mdounin.ru</email>
</author>
<published>2013-02-07T12:09:56+00:00</published>
<link rel='alternate' type='text/html' href='https://git.sigsegv.uk/nginx.git/commit/?id=a2b987e79f099e34ddc5206b2b7c85f7405e5b74'/>
<id>a2b987e79f099e34ddc5206b2b7c85f7405e5b74</id>
<content type='text'>
Note: use of {SHA} passwords is discouraged as {SHA} password scheme is
vulnerable to attacks using rainbow tables.  Use of {SSHA}, $apr1$ or
crypt() algorithms as supported by OS is recommended instead.

The {SHA} password scheme support is added to avoid the need of changing
the scheme recorded in password files from {SHA} to {SSHA} because such
a change hides security problem with {SHA} passwords.

Patch by Louis Opter, with minor changes.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Note: use of {SHA} passwords is discouraged as {SHA} password scheme is
vulnerable to attacks using rainbow tables.  Use of {SSHA}, $apr1$ or
crypt() algorithms as supported by OS is recommended instead.

The {SHA} password scheme support is added to avoid the need of changing
the scheme recorded in password files from {SHA} to {SSHA} because such
a change hides security problem with {SHA} passwords.

Patch by Louis Opter, with minor changes.
</pre>
</div>
</content>
</entry>
<entry>
<title>Version bump.</title>
<updated>2013-02-07T12:09:09+00:00</updated>
<author>
<name>Maxim Dounin</name>
<email>mdounin@mdounin.ru</email>
</author>
<published>2013-02-07T12:09:09+00:00</published>
<link rel='alternate' type='text/html' href='https://git.sigsegv.uk/nginx.git/commit/?id=6cb9bbe71cf0f3f4e31a5d768042ad3e5eb24199'/>
<id>6cb9bbe71cf0f3f4e31a5d768042ad3e5eb24199</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Version bump.</title>
<updated>2013-01-17T09:55:36+00:00</updated>
<author>
<name>Ruslan Ermilov</name>
<email>ru@nginx.com</email>
</author>
<published>2013-01-17T09:55:36+00:00</published>
<link rel='alternate' type='text/html' href='https://git.sigsegv.uk/nginx.git/commit/?id=e493f9ad4efbd9b0c7738ff8a64715e829340cd7'/>
<id>e493f9ad4efbd9b0c7738ff8a64715e829340cd7</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Fixed "proxy_pass" with IP address and no port (ticket #276).</title>
<updated>2013-01-10T12:58:55+00:00</updated>
<author>
<name>Ruslan Ermilov</name>
<email>ru@nginx.com</email>
</author>
<published>2013-01-10T12:58:55+00:00</published>
<link rel='alternate' type='text/html' href='https://git.sigsegv.uk/nginx.git/commit/?id=a2a229193abb45ad1ca4f6b3d2a7543b7e47976b'/>
<id>a2a229193abb45ad1ca4f6b3d2a7543b7e47976b</id>
<content type='text'>
Upstreams created by "proxy_pass" with IP address and no port were
broken in 1.3.10, by not initializing port in u-&gt;sockaddr.

API change: ngx_parse_url() was modified to always initialize port
(in u-&gt;sockaddr and in u-&gt;port), even for the u-&gt;no_resolve case;
ngx_http_upstream() and ngx_http_upstream_add() were adopted.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Upstreams created by "proxy_pass" with IP address and no port were
broken in 1.3.10, by not initializing port in u-&gt;sockaddr.

API change: ngx_parse_url() was modified to always initialize port
(in u-&gt;sockaddr and in u-&gt;port), even for the u-&gt;no_resolve case;
ngx_http_upstream() and ngx_http_upstream_add() were adopted.
</pre>
</div>
</content>
</entry>
<entry>
<title>The data pointer in ngx_open_file_t objects must be initialized.</title>
<updated>2013-01-08T14:01:57+00:00</updated>
<author>
<name>Valentin Bartenev</name>
<email>vbart@nginx.com</email>
</author>
<published>2013-01-08T14:01:57+00:00</published>
<link rel='alternate' type='text/html' href='https://git.sigsegv.uk/nginx.git/commit/?id=ff2e3042236e3bf522090d5b07f5f895a4cef921'/>
<id>ff2e3042236e3bf522090d5b07f5f895a4cef921</id>
<content type='text'>
Uninitialized pointer may result in arbitrary segfaults if access_log is used
without buffer and without variables in file path.

Patch by Tatsuhiko Kubo (ticket #268).
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Uninitialized pointer may result in arbitrary segfaults if access_log is used
without buffer and without variables in file path.

Patch by Tatsuhiko Kubo (ticket #268).
</pre>
</div>
</content>
</entry>
<entry>
<title>Version bump.</title>
<updated>2012-12-26T09:29:37+00:00</updated>
<author>
<name>Ruslan Ermilov</name>
<email>ru@nginx.com</email>
</author>
<published>2012-12-26T09:29:37+00:00</published>
<link rel='alternate' type='text/html' href='https://git.sigsegv.uk/nginx.git/commit/?id=0a668faba4953eed082417f1d78b1a97f73a1ebe'/>
<id>0a668faba4953eed082417f1d78b1a97f73a1ebe</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Geo: IPv6 support.</title>
<updated>2012-12-25T08:21:56+00:00</updated>
<author>
<name>Ruslan Ermilov</name>
<email>ru@nginx.com</email>
</author>
<published>2012-12-25T08:21:56+00:00</published>
<link rel='alternate' type='text/html' href='https://git.sigsegv.uk/nginx.git/commit/?id=3d87688bc60228ca4ce311805d99d0a7908d16ce'/>
<id>3d87688bc60228ca4ce311805d99d0a7908d16ce</id>
<content type='text'>
The "ranges" mode is still limited to IPv4 only.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
The "ranges" mode is still limited to IPv4 only.
</pre>
</div>
</content>
</entry>
<entry>
<title>Reopening log files code moved to a separate function.</title>
<updated>2012-12-23T15:36:52+00:00</updated>
<author>
<name>Valentin Bartenev</name>
<email>vbart@nginx.com</email>
</author>
<published>2012-12-23T15:36:52+00:00</published>
<link rel='alternate' type='text/html' href='https://git.sigsegv.uk/nginx.git/commit/?id=a8ffed57510bab2a7143eb81aa3565a4bdcb8678'/>
<id>a8ffed57510bab2a7143eb81aa3565a4bdcb8678</id>
<content type='text'>
The code refactored in a way to call custom handler that can do appropriate
cleanup work (if any), like flushing buffers, finishing compress streams,
finalizing connections to log daemon, etc..
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
The code refactored in a way to call custom handler that can do appropriate
cleanup work (if any), like flushing buffers, finishing compress streams,
finalizing connections to log daemon, etc..
</pre>
</div>
</content>
</entry>
<entry>
<title>Properly initialize "struct in6_addr" with zeroes.</title>
<updated>2012-12-22T20:03:38+00:00</updated>
<author>
<name>Ruslan Ermilov</name>
<email>ru@nginx.com</email>
</author>
<published>2012-12-22T20:03:38+00:00</published>
<link rel='alternate' type='text/html' href='https://git.sigsegv.uk/nginx.git/commit/?id=7c4068d349106f68524ac4fa3da9454d6b5cb8f4'/>
<id>7c4068d349106f68524ac4fa3da9454d6b5cb8f4</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
</feed>
