Re: proxy_pass and trailing / decode uri

2018-03-12 Thread max
ain and do not want to make an other sub-level. I cannot configure my backends (several backends) to be able to listen on /api, this is exactly why I needed to use Nginx as reverse proxy. 2018-03-12 13:28 GMT+01:00 Maxim Dounin : > Hello! > > On Mon, Mar 12, 2018 at 09:55:15AM +0100,

Re: proxy_pass and trailing / decode uri

2018-03-12 Thread max
Sorry for double post: > > I guess the only way to remove the /api part is "rewrite" and involves > re-encoding... => I guess the only way to remove the /api without re-encoding URI is "rewrite" ... Max 2018-03-12 9:55 GMT+01:00 max : > Hi, > > When y

Re: proxy_pass and trailing / decode uri

2018-03-12 Thread max
ions. > Thank you for your answer but it is not correct for location different than '/'. With your proposal, targeting http://domain1.com/api/foo/bar, socket on port 82 receives: /api/foo/bar. I guess the only way to remove the /api part is "rewrite" and involves re-encoding...

proxy_pass and trailing / decode uri

2018-03-08 Thread max
t; location respond like "/" without decoding %? This solution https://stackoverflow.com/a/37584656/3515745 seems to be just a workaround. Thanks for any hints ! Max ___ nginx mailing list nginx@nginx.org http://mailman.nginx.org/mailman/listinfo/nginx

Re: Request Compression

2016-08-28 Thread Max Clements
make-nginx-decompress-a-gzipped-request.html --Max On Sun, Aug 28, 2016 at 8:22 PM, serendipity30 wrote: > Anyone has used this? Is gzip_static used for request compression? > > Thanks > > Posted at Nginx Forum: > https://forum.nginx.org/read.ph

HTTP/2 without forward secrecy (Diffie-Hellman)

2016-08-15 Thread Max Meyer
Hi, for a test environment I successfully set up an nginx webserver (1.11.2) with HTTP/2. But for further tests I need to decrypt traffic with wireshark using the servers private key. For that I need to disable forward secrecy (since it is only a test environment security is not an issue)

Re: Advise for NTLM-Auth

2016-04-19 Thread Max Clements
n how to configure Apache, the first parts on configuring kerberos and NTP are relevant, as well as how to make a keytab file. --Max On Tue, Apr 19, 2016 at 12:29 PM, A. Schulze wrote: > > Max Clements: > >> Depending on the versions of Windows and what you are trying to do, it &

Re: Advise for NTLM-Auth

2016-04-19 Thread Max Clements
Depending on the versions of Windows and what you are trying to do, it may be possible to use Kerberos via Nginx, rather than NTLM. It requires some foo setting up Service Principal Names, but does work properly via an HTTP proxy, and provides passthrough auth, which seems to be what the desire he

[no subject]

2015-04-07 Thread Max Yap
___ nginx mailing list nginx@nginx.org http://mailman.nginx.org/mailman/listinfo/nginx

Re: Verify Content-Length matches request body

2015-03-12 Thread Max Rothman
Thank you! That makes a lot of sense. On Thu, Mar 12, 2015 at 11:15 AM, Maxim Dounin wrote: > Hello! > > On Thu, Mar 12, 2015 at 11:01:46AM -0400, Max Rothman wrote: > > > Is there a way for nginx to verify that the Content-Length header isn't > > exceeded by the ac

Verify Content-Length matches request body

2015-03-12 Thread Max Rothman
ctual body. Additionally, from my testing it appears that nginx accepts the entire request body regardless of what the Content-Length is set to. I want to be able to defend against a potential slowloris-style attack where all of my workers could get tied up with overly-large uploads. Thanks, M