main name, which would be
wonderful!
On Mon, Feb 20, 2017 at 4:56 PM, Yann Ylavic wrote:
> On Mon, Feb 20, 2017 at 8:17 PM, Spork Schivago
> wrote:
> >
> >
> > ServerName www.mydomain.com
> > Redirect "/" "https://www.mydomain.com/&q
Hello,
I was following a post from a user asking about the best way to redirect
all traffic on his server from port 80 to port 443.
Someone linked the original OP to
https://httpd.apache.org/docs/2.4/rewrite/avoid.html#redirect
I decided to post my own question instead of hijacking his question.
Sorry to butt in here. I've been following this post with some interest.
I wanted to accomplish the same thing the original OP wanted to
accomplish, redirect all traffic to the secure version of my site. I went
to the internet and found directions on how to do this using mod_rewrite
rules.
configuration, look at custom
> config:
>
> If you are using EA4: https://documentation.cpanel.
> net/display/EA4/Modify+Apache+Virtual+Hosts+with+Include+Files
> EA3 has a similar feature, but I can't find the documentation right now.
>
> - Y
>
> On Tue, Feb 7, 2
ur IPv6 virtual host. None of my
> webservers currently have IPv6 enabled, so I can't test this.
> Try to force the connection to use IPv4 or IPv6 and see if that makes a
> difference.
>
> You can try running httpd -S on the webserver to get a list of virtual
> hosts by IP
you want to provide your whole config file, I suggest creating a gist
> or pastebin post.
> You should also just run dig or host on the domain name from both machines
> and make sure you get the same results.
>
> - Y
>
> On Sun, Feb 5, 2017 at 8:25 PM, Spork Schivago
>
ual Host because it is more specific.
>
> If there is a different IP for the website on one of your systems - for
> example in the hosts file - that would cause it to all back to a different
> Virtual Host than you expect because the IP doesn't match.
>
> - Y
>
>
> On
;
> - Y
>
>
> On Thu, Jan 26, 2017 at 3:31 PM, Spork Schivago
> wrote:
>
>> I have a bit of a weird problem that I'd like some help tracking down.
>> I'm pretty sure it's something with Apache. In my Apache 2.4.25 (cPanel)
>> config file, I ha
I have a bit of a weird problem that I'd like some help tracking down.
I'm pretty sure it's something with Apache. In my Apache 2.4.25 (cPanel)
config file, I have the ServerAliases disabled. There's a "catch-all"
entry for unbound IPs, that look like this:
ServerName myhostname.mydomain.
Also, are those spaces allowed in the Apache configuration file?
Shouldn't this line:
DocumentRoot "/ srv / ftp"
be more like:
DocumentRoot "/srv/ftp"
And this line:
Be more like:
Unless the srv directory really has a space before and after srv and the
ftp directory really has a space before
hanks!
Ken
On Sun, Jan 8, 2017 at 10:29 AM, Erik Dobák wrote:
> If you consider this email as spam i am sorry. I was just celebrating the
> new year and though apache people would like the infected mushrooms album
> to be played in the evening.
>
> On 2 January 2017 at 04:20, Spor
Hello Muduli,
I'm assuming you're talking about Apache 2.4, but it shouldn't really
matter I'd think.
If I understand your question correctly, the default installation directory
for Apache is /usr/local/apache2.Is that what you want to change? If
so, you can change that using configure and
TP_HOST} !^server.example.com$
> RewriteCond %{HTTP_HOST} ^cpcalendars.
> RewriteCond %{HTTPS} on
> RewriteRule ^/(.*) https://127.0.0.1:2080/$1 [P]
>
> RewriteCond %{HTTP_HOST} !^server.example.com$
> RewriteCond %{HTTP_HOST} ^cpcontacts.
> RewriteCond
e Apache config, so
> you need to be careful.
>
> - Y
>
> Sent from a device with a very small keyboard and hyperactive autocorrect.
>
> On Jan 1, 2017 4:07 PM, "Spork Schivago" wrote:
>
>> I'd like to add that I agree with Stormy. I don't think I'
12:04 PM, Stormy wrote:
> At 04:25 PM 1/1/2017 +, Good Guy wrote:
>
>> On 01/01/2017 00:51, Spork Schivago wrote:
>>
>>> I don't understand why I'm receiving this e-mail. Is this spam?
>>> Thanks.
>>>
>>
>> Of course it is. Some
I don't understand why I'm receiving this e-mail. Is this spam?
Thanks.
On Sat, Dec 31, 2016 at 6:58 PM, Erik Dobák wrote:
> https://www.youtube.com/watch?v=zqwPjNGDuIQ&t=156s
>
anning website.
On Fri, Oct 7, 2016 at 1:53 AM, Spork Schivago
wrote:
> Tawasol,
>
> You might want to look into more than just mod_security. For example,
> there's modules out there for PHP, for instance, that will make PHP run as
> a certain user. If someone manages to tak
t;
> Thanks,
>
> On Fri, Oct 7, 2016 at 1:01 AM, Anthony Biacco wrote:
>
>>
>>
>> On Thu, Oct 6, 2016 at 3:42 PM, Spork Schivago
>> wrote:
>>
>>> Are you sure they haven't successfully found away in? There are some
>>> free
f I saw traffic like you're seeing though. But again, I'm
not really that intelligent when it comes to stuff like this.
Ken
On Thu, Oct 6, 2016 at 5:21 PM, Spork Schivago
wrote:
> Thanks Tony! Much appreciated.
>
> Erik,
>
> Did I ever try to run what on my server? T
tion. I doubt anyone at
my police station really knows much about PCs. There doesn't seem to be a
cyber crimes division or anything like that.
On Thu, Oct 6, 2016 at 4:08 PM, Anthony Biacco wrote:
>
>
> On Thu, Oct 6, 2016 at 8:47 AM, Spork Schivago
> wrote:
>
>>
&g
I remember this! I contacted the college that was running the scanners
and got indepth information about what it was and how it worked.
This is the responses I got back from the people running the scan...
Apologies for the long delay. As Stefan said, I've been away on my
honeymoon.
As far as w
e
disabled.
I think I'll try with TLSv1.0 disabled and maybe TLSv1.1 and TLSv1.2
enabled. That way I can be PCI compliant. Now I have to figure out what
this SNI is and whether I want it enabled or not.
Thanks for all the help!!
On Sat, Jul 16, 2016 at 6:06 PM, Spork Schivago
wrote:
>
connect, I'd like to not drop it. Any suggestions
from anyone?
Thanks!
On Sat, Jul 16, 2016 at 3:59 PM, Spork Schivago
wrote:
> Wow, thank you Dr. James Smith! I am going to try your cipher list and
> see if I can get the A+ rating. That's exactly what I'm after. Are
:!DSS
>
> as the setting for ciphers - this gets a A+ rating on the qualys SSL labs
> scoring (although Java 6 + IE 6 clients don't work but that is the
> compromise you need to take)
>
> James
>
>
> On 15/07/2016 22:49, Spork Schivago wrote:
>
>> Hello,
>
Hello,
I think I figured it out. I removed the DES-CBC3-SHA line from the SSL
Cipher Suite list and now this is the output from nmap:
| Issuer: commonName=Let's Encrypt Authority X3/organizationName=Let's
Encrypt/countryName=US
| Public Key type: rsa
| Public Key bits: 2048
| Signature Algorithm
Hello,
I'm sorry if this is a simple question. I'm fairly new to running an
Apache web server. I lease a virtual private server (VPS) from GoDaddy
that's running CentOS 6.8 Final with cPanel / WHM v56.0.25. Apache is
version 2.4.18 (Unix) with OpenSSL/1.0.1e-fips.
I'm trying to disable weak
ould answer
> what the actual hex string means and what Apache responded with. Perhaps
> when Paul gets back from his honeymoon, we'll receive an answer.
>
> Best of luck.
>
> Ken.
>
> On Fri, Jul 8, 2016 at 5:32 PM, Spork Schivago
> wrote:
>
>> I co
re in the clear and have nothing to worry about,
mainly because you're running Apache and not IIS. I wish I could answer
what the actual hex string means and what Apache responded with. Perhaps
when Paul gets back from his honeymoon, we'll receive an answer.
Best of luck.
Ken.
O
om him, I'll let you
know what he says.
Thanks!
On Fri, Jul 8, 2016 at 3:56 PM, Spork Schivago
wrote:
> I think I can shed a little light on this. I believe it has something to
> do with exploits / vulnerabilities. I'm not sure what the hex values are,
> but I'm
I think I can shed a little light on this. I believe it has something to
do with exploits / vulnerabilities. I'm not sure what the hex values are,
but I'm guessing that's part of the exploit. I've tried searching for it
but couldn't find anything. Maybe the query is confusing the search
eng
I put this:
RewriteEngine on
RewriteOptions AllowAnyURI # for * to be taken into account by mod_rewrite
RewriteCond %{REQUEST_METHOD} OPTIONS
RewriteRule ^ - [R=405,L]
RewriteRule ^[^/] - [R=403,L]
in my .htaccess file, but when I still telnet to mydomain 80, and try the
OPTIONS thing, i
6:49 AM, Yann Ylavic wrote:
> On Fri, Feb 12, 2016 at 2:38 AM, Spork Schivago
> wrote:
> > Sorry to but in here, but is there away for me to test to see if my
> server
> > is affected by this OPTIONS issue?
>
> OPTIONS is not an issue, could you elaborate?
>
>
ere to put it in the httpd.conf file (or the vhosts .conf
files). I use cPanel / WHM and EasyApache so it makes things much harder
to figure out.
On Fri, Feb 12, 2016 at 12:33 AM, Toomas Aas wrote:
>
> On 02/12/2016 03:38 AM, Spork Schivago wrote:
>
> Sorry to put in here, but is
Sorry to put in here, but is there away for me to test to see if my server
is affected by this OPTIONS issue? I have cPanel / WHM and ConfigServer
Firewall installed and just about every day, I see CSF blocking users from
trying to hack in using some known hacking kit. Something with the word
w0
I found a program, ConfigServer Firewall, that's pretty good at helping me
secure my servers. It plays nice with iptables and it's fairly easy to
configure. It has stuff that autoblocks IPs from bad people and can even
download lists of bad IPs and auto-blocks them.
On Mon, Feb 1, 2016 at 7:04
Hello,
I'm sorry if this has been asked before. I've searched a good bit through
the Archives on Apache's site and I've spent the last couple days trying to
find an answer on the web for my question.
I have a Virtual Private Server that I'm renting through GoDaddy. It's
running CentOS 6.7 in
36 matches
Mail list logo