Re: [PATCH] Core: monitoring anonymous map on Darwin platform

2019-09-04 Thread David CARLIER
Well it highlight them a little bit more, easier to parse, easier to identify in case with plethora of third party modules. Regards. On Wed, 4 Sep 2019 at 16:01, Maxim Dounin wrote: > > Hello! > > On Fri, Aug 23, 2019 at 06:00:29AM +0100, David Carlier wrote: > > > # HG changeset patch > > # Use

Re: [PATCH] Core: monitoring anonymous map on Darwin platform

2019-09-04 Thread Maxim Dounin
Hello! On Fri, Aug 23, 2019 at 06:00:29AM +0100, David Carlier wrote: > # HG changeset patch > # User David Carlier > # Date 1566493379 -3600 > # Thu Aug 22 18:02:59 2019 +0100 > # Node ID adc68231e590554860b11ee851b293e46ba652db > # Parent 9f1f9d6e056a4f85907957ef263f78a426ae4f9c > Core:

Re: Needing TLS handshake to fail

2019-09-04 Thread Maxim Dounin
Hello! On Wed, Sep 04, 2019 at 09:25:57AM -0400, Phillip Odam wrote: [...] > Also, the following reference was provided providing a basis for the TLS > handshake requirement, sections 7.2.1 and 7.2.2 - > https://tools.ietf.org/html/rfc5246#section-7.2.1. Admittedly production > implementation

Re: Needing TLS handshake to fail

2019-09-04 Thread Phillip Odam
Hi Maxim Thanks for the prompt feedback. My understanding for requiring the TLS itself to fail, as opposed to doing exactly what you described which is also exactly what we've done for other endponts... I quite like nginx's ability here, is that it prevents being able to take advantage of exp

Re: Needing TLS handshake to fail

2019-09-04 Thread Maxim Dounin
Hello! On Wed, Sep 04, 2019 at 08:35:05AM -0400, Phillip Odam wrote: > Hi, > > I tried asking the following on the general mailing list but I'm > guessing this is tending more towards development. > > I have a project that involves mutual / two way TLS and one of the > requirements is that th

Needing TLS handshake to fail

2019-09-04 Thread Phillip Odam
Hi, I tried asking the following on the general mailing list but I'm guessing this is tending more towards development. I have a project that involves mutual / two way TLS and one of the requirements is that the TLS handshake must fail ie. be terminated before completion if the handshake is

Re: [PATCH] HTTP: added the preserve_method option to the error_page directive.

2019-09-04 Thread Maxim Dounin
Hello! On Tue, Sep 03, 2019 at 12:07:53PM -0700, Thibault Charbonnier wrote: > # HG changeset patch > # User Thibault Charbonnier > # Date 1567537546 25200 > # Tue Sep 03 12:05:46 2019 -0700 > # Node ID 68ba3d36bff4213e3fedc538021e8cbece85e508 > # Parent 52b5ee64fe11ec267a0767cbb9874c8cae6

[nginx] Fixed "return" with discarding invalid chunked body.

2019-09-04 Thread Sergey Kandaurov
details: https://hg.nginx.org/nginx/rev/a7e8f953408e branches: changeset: 7563:a7e8f953408e user: Sergey Kandaurov date: Wed Sep 04 13:33:51 2019 +0300 description: Fixed "return" with discarding invalid chunked body. When ngx_http_discard_request_body() call was added to ngx_http_s