<feed xmlns='http://www.w3.org/2005/Atom'>
<title>nginx.git/src/http, branch release-1.7.0</title>
<subtitle>nginx</subtitle>
<link rel='alternate' type='text/html' href='https://git.sigsegv.uk/nginx.git/'/>
<entry>
<title>Upstream: for ssl name, non-aligned memory allocation is enough.</title>
<updated>2014-04-22T14:56:49+00:00</updated>
<author>
<name>Ruslan Ermilov</name>
<email>ru@nginx.com</email>
</author>
<published>2014-04-22T14:56:49+00:00</published>
<link rel='alternate' type='text/html' href='https://git.sigsegv.uk/nginx.git/commit/?id=e0e811d60191b5ea79b6fdf0aec3c220ec879f92'/>
<id>e0e811d60191b5ea79b6fdf0aec3c220ec879f92</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>SPDY: avoid sending RST_STREAM on WINDOW_UPDATE with unknown SID.</title>
<updated>2014-04-21T15:21:17+00:00</updated>
<author>
<name>Valentin Bartenev</name>
<email>vbart@nginx.com</email>
</author>
<published>2014-04-21T15:21:17+00:00</published>
<link rel='alternate' type='text/html' href='https://git.sigsegv.uk/nginx.git/commit/?id=f79908af6e6e579ec8d1dd10bf54da65cb7bd769'/>
<id>f79908af6e6e579ec8d1dd10bf54da65cb7bd769</id>
<content type='text'>
There's a race condition between closing a stream by one endpoint
and sending a WINDOW_UPDATE frame by another.  So it would be better
to just skip such frames for unknown streams, like is already done
for the DATA frames.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
There's a race condition between closing a stream by one endpoint
and sending a WINDOW_UPDATE frame by another.  So it would be better
to just skip such frames for unknown streams, like is already done
for the DATA frames.
</pre>
</div>
</content>
</entry>
<entry>
<title>SPDY: Stream-ID restrictions according to specification.</title>
<updated>2014-04-21T14:59:53+00:00</updated>
<author>
<name>Valentin Bartenev</name>
<email>vbart@nginx.com</email>
</author>
<published>2014-04-21T14:59:53+00:00</published>
<link rel='alternate' type='text/html' href='https://git.sigsegv.uk/nginx.git/commit/?id=a57959b6cdc3729bc8e5bc380c6f47399720da6f'/>
<id>a57959b6cdc3729bc8e5bc380c6f47399720da6f</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Upstream: uwsgi_ssl_name, uwsgi_ssl_verify, and so on.</title>
<updated>2014-04-18T16:13:32+00:00</updated>
<author>
<name>Maxim Dounin</name>
<email>mdounin@mdounin.ru</email>
</author>
<published>2014-04-18T16:13:32+00:00</published>
<link rel='alternate' type='text/html' href='https://git.sigsegv.uk/nginx.git/commit/?id=cae1bd3831bab6b14bc7639024fe2cf67624c815'/>
<id>cae1bd3831bab6b14bc7639024fe2cf67624c815</id>
<content type='text'>
Just a merge of proxy_ssl_name, proxy_ssl_verify commits into uwsgi module,
code is identical.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Just a merge of proxy_ssl_name, proxy_ssl_verify commits into uwsgi module,
code is identical.
</pre>
</div>
</content>
</entry>
<entry>
<title>Upstream: proxy_ssl_verify and friends.</title>
<updated>2014-04-18T16:13:30+00:00</updated>
<author>
<name>Maxim Dounin</name>
<email>mdounin@mdounin.ru</email>
</author>
<published>2014-04-18T16:13:30+00:00</published>
<link rel='alternate' type='text/html' href='https://git.sigsegv.uk/nginx.git/commit/?id=27475dd7ee7eb4ad8474054d44cf468347c3d8b5'/>
<id>27475dd7ee7eb4ad8474054d44cf468347c3d8b5</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Upstream: proxy_ssl_name and proxy_ssl_server_name directives.</title>
<updated>2014-04-18T16:13:28+00:00</updated>
<author>
<name>Maxim Dounin</name>
<email>mdounin@mdounin.ru</email>
</author>
<published>2014-04-18T16:13:28+00:00</published>
<link rel='alternate' type='text/html' href='https://git.sigsegv.uk/nginx.git/commit/?id=59ef4a34177d6175f38824a43768937d6f3486fc'/>
<id>59ef4a34177d6175f38824a43768937d6f3486fc</id>
<content type='text'>
These directives allow to switch on Server Name Indication (SNI) while
connecting to upstream servers.

By default, proxy_ssl_server_name is currently off (that is, no SNI) and
proxy_ssl_name is set to a host used in the proxy_pass directive.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
These directives allow to switch on Server Name Indication (SNI) while
connecting to upstream servers.

By default, proxy_ssl_server_name is currently off (that is, no SNI) and
proxy_ssl_name is set to a host used in the proxy_pass directive.
</pre>
</div>
</content>
</entry>
<entry>
<title>Upstream: plugged potential memory leak on reload.</title>
<updated>2014-04-18T16:13:24+00:00</updated>
<author>
<name>Maxim Dounin</name>
<email>mdounin@mdounin.ru</email>
</author>
<published>2014-04-18T16:13:24+00:00</published>
<link rel='alternate' type='text/html' href='https://git.sigsegv.uk/nginx.git/commit/?id=93eb94d622093829da4bd4c3e0af16b360e912e4'/>
<id>93eb94d622093829da4bd4c3e0af16b360e912e4</id>
<content type='text'>
The SSL_CTX_set_cipher_list() may fail if there are no valid ciphers
specified in proxy_ssl_ciphers / uwsgi_ssl_ciphers, resulting in
SSL context leak.

In theory, ngx_pool_cleanup_add() may fail too, but this case is
intentionally left out for now as it's almost impossible and proper fix
will require changes to http ssl and mail ssl code as well.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
The SSL_CTX_set_cipher_list() may fail if there are no valid ciphers
specified in proxy_ssl_ciphers / uwsgi_ssl_ciphers, resulting in
SSL context leak.

In theory, ngx_pool_cleanup_add() may fail too, but this case is
intentionally left out for now as it's almost impossible and proper fix
will require changes to http ssl and mail ssl code as well.
</pre>
</div>
</content>
</entry>
<entry>
<title>SSL: $ssl_server_name variable.</title>
<updated>2014-04-18T16:13:21+00:00</updated>
<author>
<name>Maxim Dounin</name>
<email>mdounin@mdounin.ru</email>
</author>
<published>2014-04-18T16:13:21+00:00</published>
<link rel='alternate' type='text/html' href='https://git.sigsegv.uk/nginx.git/commit/?id=6c9c973aa77b68a9adb1d0814ef5920aaf0ef157'/>
<id>6c9c973aa77b68a9adb1d0814ef5920aaf0ef157</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Access log: the "if" parameter of the "access_log" directive.</title>
<updated>2014-04-15T17:32:56+00:00</updated>
<author>
<name>Sergey Kandaurov</name>
<email>pluknet@nginx.com</email>
</author>
<published>2014-04-15T17:32:56+00:00</published>
<link rel='alternate' type='text/html' href='https://git.sigsegv.uk/nginx.git/commit/?id=7cf53e11f5189f7d50d68a1ac9d00604d1e16553'/>
<id>7cf53e11f5189f7d50d68a1ac9d00604d1e16553</id>
<content type='text'>
The parameter value specifies a condition under which the request is logged.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
The parameter value specifies a condition under which the request is logged.
</pre>
</div>
</content>
</entry>
<entry>
<title>SPDY: fixed typo in log message.</title>
<updated>2014-04-16T07:40:42+00:00</updated>
<author>
<name>Valentin Bartenev</name>
<email>vbart@nginx.com</email>
</author>
<published>2014-04-16T07:40:42+00:00</published>
<link rel='alternate' type='text/html' href='https://git.sigsegv.uk/nginx.git/commit/?id=c69cabed1dfb6e375c7e2c47554577812a811694'/>
<id>c69cabed1dfb6e375c7e2c47554577812a811694</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
</feed>
