<feed xmlns='http://www.w3.org/2005/Atom'>
<title>nginx.git/src/mail, branch release-1.6.3</title>
<subtitle>nginx</subtitle>
<link rel='alternate' type='text/html' href='https://git.sigsegv.uk/nginx.git/'/>
<entry>
<title>Mail: discard pipelined commands after SMTP STARTTLS.</title>
<updated>2014-08-05T08:22:07+00:00</updated>
<author>
<name>Maxim Dounin</name>
<email>mdounin@mdounin.ru</email>
</author>
<published>2014-08-05T08:22:07+00:00</published>
<link rel='alternate' type='text/html' href='https://git.sigsegv.uk/nginx.git/commit/?id=fbd2c8273154524297804e3b6fd5046e6a316b3e'/>
<id>fbd2c8273154524297804e3b6fd5046e6a316b3e</id>
<content type='text'>
The bug had appeared in nginx 1.5.6 (04e43d03e153).

Reported by Chris Boulton.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
The bug had appeared in nginx 1.5.6 (04e43d03e153).

Reported by Chris Boulton.
</pre>
</div>
</content>
</entry>
<entry>
<title>Mail: added a check for the number of arguments in MAIL/RCPT.</title>
<updated>2014-05-21T17:56:20+00:00</updated>
<author>
<name>Maxim Dounin</name>
<email>mdounin@mdounin.ru</email>
</author>
<published>2014-05-21T17:56:20+00:00</published>
<link rel='alternate' type='text/html' href='https://git.sigsegv.uk/nginx.git/commit/?id=f96771ab0519eaec5808d8816db5ba262c6c1b70'/>
<id>f96771ab0519eaec5808d8816db5ba262c6c1b70</id>
<content type='text'>
Missed during introduction of the SMTP pipelining support (04e43d03e153,
1.5.6).  Previously, the check wasn't needed as s-&gt;buffer was used directly
and the number of arguments didn't matter.

Reported by Svyatoslav Nikolsky.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Missed during introduction of the SMTP pipelining support (04e43d03e153,
1.5.6).  Previously, the check wasn't needed as s-&gt;buffer was used directly
and the number of arguments didn't matter.

Reported by Svyatoslav Nikolsky.
</pre>
</div>
</content>
</entry>
<entry>
<title>Mail: fixed ngx_mail_send() (ticket #519).</title>
<updated>2014-03-31T17:38:27+00:00</updated>
<author>
<name>Maxim Dounin</name>
<email>mdounin@mdounin.ru</email>
</author>
<published>2014-03-31T17:38:27+00:00</published>
<link rel='alternate' type='text/html' href='https://git.sigsegv.uk/nginx.git/commit/?id=e042fc903883341806366b39a526711b77f5c34b'/>
<id>e042fc903883341806366b39a526711b77f5c34b</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Fixed format specifier in logging of "c-&gt;number".</title>
<updated>2014-03-06T14:25:59+00:00</updated>
<author>
<name>Sergey Kandaurov</name>
<email>pluknet@nginx.com</email>
</author>
<published>2014-03-06T14:25:59+00:00</published>
<link rel='alternate' type='text/html' href='https://git.sigsegv.uk/nginx.git/commit/?id=bd3516e8d98815a540ff65451889f6a2a0991c71'/>
<id>bd3516e8d98815a540ff65451889f6a2a0991c71</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Mail: fixed passing of IPv6 client address in XCLIENT.</title>
<updated>2014-01-17T18:06:04+00:00</updated>
<author>
<name>Ruslan Ermilov</name>
<email>ru@nginx.com</email>
</author>
<published>2014-01-17T18:06:04+00:00</published>
<link rel='alternate' type='text/html' href='https://git.sigsegv.uk/nginx.git/commit/?id=8b7fe56e95f7fe51438566150dda68027735198e'/>
<id>8b7fe56e95f7fe51438566150dda68027735198e</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>SSL: ssl_session_tickets directive.</title>
<updated>2014-01-10T15:12:40+00:00</updated>
<author>
<name>Dirkjan Bussink</name>
<email>d.bussink@gmail.com</email>
</author>
<published>2014-01-10T15:12:40+00:00</published>
<link rel='alternate' type='text/html' href='https://git.sigsegv.uk/nginx.git/commit/?id=58a240d7735652138da46c64b5eb9e661e5533f5'/>
<id>58a240d7735652138da46c64b5eb9e661e5533f5</id>
<content type='text'>
This adds support so it's possible to explicitly disable SSL Session
Tickets. In order to have good Forward Secrecy support either the
session ticket key has to be reloaded by using nginx' binary upgrade
process or using an external key file and reloading the configuration.
This directive adds another possibility to have good support by
disabling session tickets altogether.

If session tickets are enabled and the process lives for a long a time,
an attacker can grab the session ticket from the process and use that to
decrypt any traffic that occured during the entire lifetime of the
process.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
This adds support so it's possible to explicitly disable SSL Session
Tickets. In order to have good Forward Secrecy support either the
session ticket key has to be reloaded by using nginx' binary upgrade
process or using an external key file and reloading the configuration.
This directive adds another possibility to have good support by
disabling session tickets altogether.

If session tickets are enabled and the process lives for a long a time,
an attacker can grab the session ticket from the process and use that to
decrypt any traffic that occured during the entire lifetime of the
process.
</pre>
</div>
</content>
</entry>
<entry>
<title>Resolver: implemented IPv6 name to address resolving.</title>
<updated>2013-12-09T06:53:28+00:00</updated>
<author>
<name>Ruslan Ermilov</name>
<email>ru@nginx.com</email>
</author>
<published>2013-12-09T06:53:28+00:00</published>
<link rel='alternate' type='text/html' href='https://git.sigsegv.uk/nginx.git/commit/?id=769eded73267274e018f460dd76b417538aa5934'/>
<id>769eded73267274e018f460dd76b417538aa5934</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Changed resolver API to use ngx_addr_t.</title>
<updated>2013-12-06T10:30:27+00:00</updated>
<author>
<name>Ruslan Ermilov</name>
<email>ru@nginx.com</email>
</author>
<published>2013-12-06T10:30:27+00:00</published>
<link rel='alternate' type='text/html' href='https://git.sigsegv.uk/nginx.git/commit/?id=3aeefbcaea75c1ccf158be15afe61ce863978be9'/>
<id>3aeefbcaea75c1ccf158be15afe61ce863978be9</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>SSL: added ability to set keys used for Session Tickets (RFC5077).</title>
<updated>2013-10-11T23:05:24+00:00</updated>
<author>
<name>Piotr Sikora</name>
<email>piotr@cloudflare.com</email>
</author>
<published>2013-10-11T23:05:24+00:00</published>
<link rel='alternate' type='text/html' href='https://git.sigsegv.uk/nginx.git/commit/?id=79be6a5462498af8655aaed141f13a1d2a34abc8'/>
<id>79be6a5462498af8655aaed141f13a1d2a34abc8</id>
<content type='text'>
In order to support key rollover, ssl_session_ticket_key can be defined
multiple times. The first key will be used to issue and resume Session
Tickets, while the rest will be used only to resume them.

    ssl_session_ticket_key  session_tickets/current.key;
    ssl_session_ticket_key  session_tickets/prev-1h.key;
    ssl_session_ticket_key  session_tickets/prev-2h.key;

Please note that nginx supports Session Tickets even without explicit
configuration of the keys and this feature should be only used in setups
where SSL traffic is distributed across multiple nginx servers.

Signed-off-by: Piotr Sikora &lt;piotr@cloudflare.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
In order to support key rollover, ssl_session_ticket_key can be defined
multiple times. The first key will be used to issue and resume Session
Tickets, while the rest will be used only to resume them.

    ssl_session_ticket_key  session_tickets/current.key;
    ssl_session_ticket_key  session_tickets/prev-1h.key;
    ssl_session_ticket_key  session_tickets/prev-2h.key;

Please note that nginx supports Session Tickets even without explicit
configuration of the keys and this feature should be only used in setups
where SSL traffic is distributed across multiple nginx servers.

Signed-off-by: Piotr Sikora &lt;piotr@cloudflare.com&gt;
</pre>
</div>
</content>
</entry>
<entry>
<title>Mail: fixed segfault with ssl/starttls at mail{} level and no cert.</title>
<updated>2013-09-30T18:10:13+00:00</updated>
<author>
<name>Maxim Dounin</name>
<email>mdounin@mdounin.ru</email>
</author>
<published>2013-09-30T18:10:13+00:00</published>
<link rel='alternate' type='text/html' href='https://git.sigsegv.uk/nginx.git/commit/?id=ef8c64acbe7b826b2bbd2dacc0e173cf79b26d37'/>
<id>ef8c64acbe7b826b2bbd2dacc0e173cf79b26d37</id>
<content type='text'>
A configuration like "mail { starttls on; server {}}" triggered NULL
pointer dereference in ngx_mail_ssl_merge_conf() as conf-&gt;file was not set.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
A configuration like "mail { starttls on; server {}}" triggered NULL
pointer dereference in ngx_mail_ssl_merge_conf() as conf-&gt;file was not set.
</pre>
</div>
</content>
</entry>
</feed>
