<feed xmlns='http://www.w3.org/2005/Atom'>
<title>nginx.git/src/http/modules, branch release-1.5.9</title>
<subtitle>nginx</subtitle>
<link rel='alternate' type='text/html' href='https://git.sigsegv.uk/nginx.git/'/>
<entry>
<title>SSL: fixed ssl_verify_depth to take only one argument.</title>
<updated>2014-01-14T11:56:40+00:00</updated>
<author>
<name>Maxim Dounin</name>
<email>mdounin@mdounin.ru</email>
</author>
<published>2014-01-14T11:56:40+00:00</published>
<link rel='alternate' type='text/html' href='https://git.sigsegv.uk/nginx.git/commit/?id=70b48a491a0a4dbcbcfc9ca86b22ca966a473ba1'/>
<id>70b48a491a0a4dbcbcfc9ca86b22ca966a473ba1</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>SSL: ssl_session_tickets directive.</title>
<updated>2014-01-10T15:12:40+00:00</updated>
<author>
<name>Dirkjan Bussink</name>
<email>d.bussink@gmail.com</email>
</author>
<published>2014-01-10T15:12:40+00:00</published>
<link rel='alternate' type='text/html' href='https://git.sigsegv.uk/nginx.git/commit/?id=58a240d7735652138da46c64b5eb9e661e5533f5'/>
<id>58a240d7735652138da46c64b5eb9e661e5533f5</id>
<content type='text'>
This adds support so it's possible to explicitly disable SSL Session
Tickets. In order to have good Forward Secrecy support either the
session ticket key has to be reloaded by using nginx' binary upgrade
process or using an external key file and reloading the configuration.
This directive adds another possibility to have good support by
disabling session tickets altogether.

If session tickets are enabled and the process lives for a long a time,
an attacker can grab the session ticket from the process and use that to
decrypt any traffic that occured during the entire lifetime of the
process.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
This adds support so it's possible to explicitly disable SSL Session
Tickets. In order to have good Forward Secrecy support either the
session ticket key has to be reloaded by using nginx' binary upgrade
process or using an external key file and reloading the configuration.
This directive adds another possibility to have good support by
disabling session tickets altogether.

If session tickets are enabled and the process lives for a long a time,
an attacker can grab the session ticket from the process and use that to
decrypt any traffic that occured during the entire lifetime of the
process.
</pre>
</div>
</content>
</entry>
<entry>
<title>Fixed setting of content type in some cases.</title>
<updated>2013-12-27T15:40:04+00:00</updated>
<author>
<name>Ruslan Ermilov</name>
<email>ru@nginx.com</email>
</author>
<published>2013-12-27T15:40:04+00:00</published>
<link rel='alternate' type='text/html' href='https://git.sigsegv.uk/nginx.git/commit/?id=2539ce036f6f9d9c2f0e9d6e723d1f0785b9dc0a'/>
<id>2539ce036f6f9d9c2f0e9d6e723d1f0785b9dc0a</id>
<content type='text'>
This fixes content type set in stub_status and autoindex responses
to be usable in content type checks made by filter modules, such
as charset and sub filters.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
This fixes content type set in stub_status and autoindex responses
to be usable in content type checks made by filter modules, such
as charset and sub filters.
</pre>
</div>
</content>
</entry>
<entry>
<title>Style: removed surplus semicolons.</title>
<updated>2013-12-27T14:47:42+00:00</updated>
<author>
<name>Valentin Bartenev</name>
<email>vbart@nginx.com</email>
</author>
<published>2013-12-27T14:47:42+00:00</published>
<link rel='alternate' type='text/html' href='https://git.sigsegv.uk/nginx.git/commit/?id=2b1156d1018bbeb0ebdc46c576cd5adb203db373'/>
<id>2b1156d1018bbeb0ebdc46c576cd5adb203db373</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Dav: emit a warning about unsafe URI.</title>
<updated>2013-12-23T14:12:03+00:00</updated>
<author>
<name>Ruslan Ermilov</name>
<email>ru@nginx.com</email>
</author>
<published>2013-12-23T14:12:03+00:00</published>
<link rel='alternate' type='text/html' href='https://git.sigsegv.uk/nginx.git/commit/?id=9b4a99cf5d5c12557136dc205c87ffa0bdc60012'/>
<id>9b4a99cf5d5c12557136dc205c87ffa0bdc60012</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Teach ngx_http_parse_unsafe_uri() how to unescape URIs.</title>
<updated>2013-12-23T14:12:00+00:00</updated>
<author>
<name>Ruslan Ermilov</name>
<email>ru@nginx.com</email>
</author>
<published>2013-12-23T14:12:00+00:00</published>
<link rel='alternate' type='text/html' href='https://git.sigsegv.uk/nginx.git/commit/?id=f7ff5e65d0d20ba0425be7e3d8de4d04ceec9206'/>
<id>f7ff5e65d0d20ba0425be7e3d8de4d04ceec9206</id>
<content type='text'>
This fixes handling of escaped URIs in X-Accel-Redirect (ticket #316),
SSI (ticket #240), and DAV.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
This fixes handling of escaped URIs in X-Accel-Redirect (ticket #316),
SSI (ticket #240), and DAV.
</pre>
</div>
</content>
</entry>
<entry>
<title>SSL: ssl_buffer_size directive.</title>
<updated>2013-12-20T12:18:25+00:00</updated>
<author>
<name>Maxim Dounin</name>
<email>mdounin@mdounin.ru</email>
</author>
<published>2013-12-20T12:18:25+00:00</published>
<link rel='alternate' type='text/html' href='https://git.sigsegv.uk/nginx.git/commit/?id=37b7de6df74b29153b4bfd0da5bef28fb4dbda77'/>
<id>37b7de6df74b29153b4bfd0da5bef28fb4dbda77</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Upstream: simplified peer selection loop in the "ip_hash" module.</title>
<updated>2013-12-09T09:43:27+00:00</updated>
<author>
<name>Vladimir Homutov</name>
<email>vl@nginx.com</email>
</author>
<published>2013-12-09T09:43:27+00:00</published>
<link rel='alternate' type='text/html' href='https://git.sigsegv.uk/nginx.git/commit/?id=c7a0b0466528ee588d3352981033e7590783e6bc'/>
<id>c7a0b0466528ee588d3352981033e7590783e6bc</id>
<content type='text'>
Conditions for skipping ineligible peers are rewritten to make adding of new
conditions simpler and be in line with the "round_robin" and "least_conn"
modules.  No functional changes.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Conditions for skipping ineligible peers are rewritten to make adding of new
conditions simpler and be in line with the "round_robin" and "least_conn"
modules.  No functional changes.
</pre>
</div>
</content>
</entry>
<entry>
<title>Trailing whitespace fix.</title>
<updated>2013-12-12T16:28:48+00:00</updated>
<author>
<name>Maxim Dounin</name>
<email>mdounin@mdounin.ru</email>
</author>
<published>2013-12-12T16:28:48+00:00</published>
<link rel='alternate' type='text/html' href='https://git.sigsegv.uk/nginx.git/commit/?id=0c585adfd40ec2757053701fe2aae6cb6948cbeb'/>
<id>0c585adfd40ec2757053701fe2aae6cb6948cbeb</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Use ngx_chain_get_free_buf() in pipe input filters.</title>
<updated>2013-12-11T17:30:38+00:00</updated>
<author>
<name>Valentin Bartenev</name>
<email>vbart@nginx.com</email>
</author>
<published>2013-12-11T17:30:38+00:00</published>
<link rel='alternate' type='text/html' href='https://git.sigsegv.uk/nginx.git/commit/?id=2576530c5123da466f75169418386887748b99b1'/>
<id>2576530c5123da466f75169418386887748b99b1</id>
<content type='text'>
No functional changes.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
No functional changes.
</pre>
</div>
</content>
</entry>
</feed>
