*) Fixed off-by-one buffer overflow bug in the compatibility functionality (mapping of old directives to new ones). *) Fixed memory leak in processing of CA certificates. *) In case there is actually a certificate chain in the session cache, we now use the value of SSL_get_peer_certificate(ssl) to verify as it will have been removed from the chain before it was put in the cache. *) Seed the PRNG with a maximum of 1K from the internal scoreboard.
>>644 > http://www.modssl.org/ に、ちゃんとリモートから突ける > セキュリティホールがあるのかどうか書いてほしいよな。 > で、今回はこんな感じだ。 > > *) Fixed off-by-one buffer overflow bug in the compatibility > functionality (mapping of old directives to new ones). 十分書いてるようにみえるんですが… off-by-one調べれ
>>650 >> *) Fixed off-by-one buffer overflow bug in the compatibility >> functionality (mapping of old directives to new ones). > > 十分書いてるようにみえるんですが… > off-by-one調べれ
apache.org name server NS.HYPERREAL.org apache.org name server NS1.COVALENT.NET % host www.apache.org. ns.hyperreal.org. Using domain server: Name: ns.hyperreal.org Addresses: 209.133.83.22
www.apache.org has address 209.66.108.5 % host www.apache.org. ns1.covalent.net. Using domain server: Name: ns1.covalent.net Addresses: 64.84.21.103
Domain names in the .com, .net, and .org domains can now be registered with many different competing registrars. Go to http://www.internic.net for detailed information.
No match for "APACH.ORG".
>>> Last update of whois database: Wed, 26 Jun 2002 04:49:57 EDT <<<
The Registry database contains ONLY .COM, .NET, .ORG, .EDU domains and Registrars.
Adds or modifies the password for user jsmith. The user is prompted for the password. If executed on a Windows system, the password will be encrypted using the modified Apache MD5 algorithm; otherwise, the system's crypt() routine will be used. If the file does not exist, htpasswd will do nothing except return an error. 初期値が追加、ってことじゃないの?
htpasswd -n[mdps] username htpasswd -nb[mdps] username password -c Create a new file. -n Don't update file; display results on stdout. -m Force MD5 encryption of the password. -d Force CRYPT encryption of the password (default). -p Do not encrypt the password (plaintext). -s Force SHA encryption of the password. -b Use the password from the command line rather than prompting for it. On Windows, TPF and NetWare systems the '-m' flag is used by default. On all other systems, the '-p' flag will probably not work.