Re: Ergobaby sport with comfortable and convenient baby carrier pinksale sale

2014-10-20 Thread Katrina Sides
You can get best baby carrier for babies upto 3 months old online. For these baby carrier design look here http://newborncarrier.edicy.co/blog/checklist-for-purchasing-baby-newborn-carrier. -- Posted via http://www.ruby-forum.com/. ___ nginx mailing li

Re: Nginx Security Hardening and Rules

2014-10-20 Thread Maxim Dounin
Hello! On Mon, Oct 20, 2014 at 07:24:27PM +0200, Stefanita Rares Dumitrescu wrote: > > On 20/10/2014 07:46, Maxim Dounin wrote: > >I always wonder why people think that hiding versions improves > >security. > > > >http://en.wikipedia.org/wiki/Security_through_obscurity > > > > > Usually this is

Re: Nginx Security Hardening and Rules

2014-10-20 Thread mex
for scanners/indexes of public services your might search for "shodan" for the valid use of security trhough obscurity: "My thoughts on this are that obscuring information is helpful to security in many cases as it can force an attacker to generate more "noise" which can be detected. Where obsc

Re: Nginx Security Hardening and Rules

2014-10-20 Thread Stefanita Rares Dumitrescu
On 20/10/2014 07:46, Maxim Dounin wrote: I always wonder why people think that hiding versions improves security. http://en.wikipedia.org/wiki/Security_through_obscurity Usually this is done as a preventive measure against 0days if you're not around to fix stuff for instance. automated scann

RE: XP/IE8 HTTPS support :(

2014-10-20 Thread Lukas Tribus
> I have a few users that are having issues with my website now that I  > disabled SSLv3. Turns out the only cipher that would/should work with  > XP/IE8 is TLS1.0: "TLS_RSA_WITH_3DES_EDE_CBC_SHA" (there are two RC4's  > that also work, but I understand that is really not recommended).  >  > Can an

Re: XP/IE8 HTTPS support :(

2014-10-20 Thread itpp2012
Try this; ssl_prefer_server_ciphers On; ssl_protocols TLSv1 TLSv1.1 TLSv1.2; ssl_ciphers ECDH+AESGCM:DH+AESGCM:ECDH+AES256:DH+AES256:ECDH+AES128:DH+AES:ECDH+3DES:DH+3DES:RSA+AESGCM:RSA+AES:RSA+3DES:!aNULL:!eNULL:!MD5:!DSS; Works with IE7/xp, sslabs is ok with this as well. Posted at Nginx Forum:

XP/IE8 HTTPS support :(

2014-10-20 Thread AJ Weber
I have a few users that are having issues with my website now that I disabled SSLv3. Turns out the only cipher that would/should work with XP/IE8 is TLS1.0: "TLS_RSA_WITH_3DES_EDE_CBC_SHA" (there are two RC4's that also work, but I understand that is really not recommended). Can anyone tell m

Re: Nginx Security Hardening and Rules

2014-10-20 Thread Maxim Dounin
Hello! On Mon, Oct 20, 2014 at 09:37:51AM -0400, c0nw0nk wrote: > Yeah sorry about that Maxim i don't actualy use the allow ip feature i > accidently hashed out the #deny all; and this forum does not let us edit our > posts. This is because it's not a forum, it's a mailing list. > Other than th

Re: Nginx Security Hardening and Rules

2014-10-20 Thread c0nw0nk
I just read on the Wiki why you missed out putting head in the limit_except block. "Allowing the GET method makes the HEAD method also allowed." Posted at Nginx Forum: http://forum.nginx.org/read.php?2,254125,254167#msg-254167 ___ nginx mailing list n

Re: Nginx Security Hardening and Rules

2014-10-20 Thread c0nw0nk
Yeah sorry about that Maxim i don't actualy use the allow ip feature i accidently hashed out the #deny all; and this forum does not let us edit our posts. Other than that the following that you posted. if ($request_method !~ ^(GET|HEAD|POST)$ ) { return 444; } For nginx itself this is not needed