The site www.mext.go.jp is running Apache/1.3.12 (Unix) on Solaris The site www.pref.osaka.jp is running Microsoft-IIS/4.0 on Linux The site www.opas.gr.jp is running Apache/1.3.26 (Unix) on Solaris 8 The site www.city.osaka.jp is running Netscape-Enterprise/3.6 on Solaris The site www.city.sakai.osaka.jp is running Apache/1.3.23 (Unix) on FreeBSD
www.pref.osaka.jpって GET / HTTP/1.0 すると、Apache/1.3.20 (Unix)なんだけど、 GET / HTTP/1.1 すると、Microsoft-IIS/4.0なんですね。 DQNな質問で申し訳ないですが、これってどういうことなんでしょうか?
The site www.pref.fukuoka.jp is running Apache/1.3.26 (Unix) on unknown. The site www.pref.saga.jp is running Apache/1.3.23 (TurboLinux) PHP/3.0.18-i18n-ja-2 on Linux. The site www.pref.kumamoto.jp is running Microsoft-IIS/4.0 on NT4/Windows 98. The site www.pref.miyazaki.jp is running Netscape-Enterprise/4.1 on HP-UX. The site www.pref.nagasaki.jp is running Rapidsite/Apa on IRIX. The site www.pref.oita.jp is running Apache/1.3.26 (Unix) on Solaris 8. The site www.pref.kagoshima.jp is running Apache/1.3.22 (Unix) on Solaris. The site www.pref.okinawa.jp is running Apache on FreeBSD.
*) Fixed off-by-one buffer overflow bug in the compatibility functionality (mapping of old directives to new ones). *) Fixed memory leak in processing of CA certificates. *) In case there is actually a certificate chain in the session cache, we now use the value of SSL_get_peer_certificate(ssl) to verify as it will have been removed from the chain before it was put in the cache. *) Seed the PRNG with a maximum of 1K from the internal scoreboard.
>>644 > http://www.modssl.org/ に、ちゃんとリモートから突ける > セキュリティホールがあるのかどうか書いてほしいよな。 > で、今回はこんな感じだ。 > > *) Fixed off-by-one buffer overflow bug in the compatibility > functionality (mapping of old directives to new ones). 十分書いてるようにみえるんですが… off-by-one調べれ
>>650 >> *) Fixed off-by-one buffer overflow bug in the compatibility >> functionality (mapping of old directives to new ones). > > 十分書いてるようにみえるんですが… > off-by-one調べれ