I see a fair amount of hacking attempts in the access.log. That is, they show up with a return code of 400 (malformed). Well yeah, they are certainly malformed. But when I add the offending IP address to my blocked list, they still show up as malformed upon subsequent readings of access.log. That
Hi,
I am currently writing a dynamic nginx http module which is linked to a
static C++ library using the following command:
CORE_LIBS="$CORE_LIBS /path/to/static/library.a"
I just started using nginx and am a beginner and I am stuck at the point
where I am unable to call functions present in the
use block device directly like ats and squid, and build request offset hash
table,
should be more effectively? Would nginx support this?
Posted at Nginx Forum:
https://forum.nginx.org/read.php?2,268627,268627#msg-268627
___
nginx mailing list
nginx@ng
On Fri, Jul 29, 2016 at 3:58 AM, Francis Daly wrote:
> On Thu, Jul 28, 2016 at 10:13:30PM -0400, Larry Martell wrote:
> Does "iptables -L -v -n" show anything interesting? You said that you
> disabled the firewall, so it probably is empty.
I am on Centos7 which uses firewalld, not iptables. I had
On Thu, Jul 28, 2016 at 10:13:30PM -0400, Larry Martell wrote:
> On Thu, Jul 28, 2016 at 3:52 PM, Francis Daly wrote:
> > On Thu, Jul 28, 2016 at 03:01:17PM -0400, Larry Martell wrote:
Hi there,
> > From the nginx server, does "curl -v http://127.0.0.1/";
>
> That returns the django login page,