Reverse Proxy Bypass – Bug in Apache mod_proxy
Wednesday, October 5th, 2011It is possible for an attacker to reach internal resources in a DMZ if RewriteRule or ProxyPassMatch directives are used in mod_proxy config
It is possible for an attacker to reach internal resources in a DMZ if RewriteRule or ProxyPassMatch directives are used in mod_proxy config
Posted in apache, bug, mod_proxy, rewrite, Security, vulnerability, vulns | Comments Off | permalink
It is possible for an attacker to reach internal resources in a DMZ if RewriteRule or ProxyPassMatch directives are used in mod_proxy config
Posted in apache, bug, mod_proxy, rewrite, Security, vulnerability, vulns | Comments Off | permalink
Interesting test results comparing and analyzing SSL performance. Using right combination of software and proper tunning, you can get up to 14000 TPS (re-shake every 80 requests) on HP DL 380 G7, with two Xeon L5630 (running at 2.13GHz for a total of…
Posted in benchmark, comparison, Linux, networking, nginx, openssl, performance, Security, ssl, STUD, stunnel, sysadmin, tls | Comments Off | permalink
Interesting test results comparing and analyzing SSL performance. Using right combination of software and proper tunning, you can get up to 14000 TPS (re-shake every 80 requests) on HP DL 380 G7, with two Xeon L5630 (running at 2.13GHz for a total of…
Posted in benchmark, comparison, Linux, networking, nginx, openssl, performance, Security, ssl, STUD, stunnel, sysadmin, tls | Comments Off | permalink
Read this if you need to deal with traffic shaping on linux. Most of linux-based firewall appliances use HTB, this helps in understanding of what is going on behind the scenes.
Posted in bandwidth, htb, LARTC, Linux, network, networking, qos, queue, reference, shaping, tc | Comments Off | permalink
Read this if you need to deal with traffic shaping on linux. Most of linux-based firewall appliances use HTB, this helps in understanding of what is going on behind the scenes.
Posted in bandwidth, htb, LARTC, Linux, network, networking, qos, queue, reference, shaping, tc | Comments Off | permalink
Posted in 10G, AES, AES-NI, benchmark, for:@twitter, has:for, has:shortcut, intel, network, openvpn, performance, Security, shortcut:openvpn, testing, vpn | Comments Off | permalink
MOXIE MARLINSPIKE talk at BlackHat USA 2011 about current problems with SSL and CA sustem, and the feature of SSL w/out CAs.
Posted in authenticity, blackhat, CA, crypto, infosec, Security, ssl, trust, video | Comments Off | permalink
Posted in authenticity, blackhat, CA, crypto, for:@twitter, has:for, infosec, Security, ssl, trust, video | Comments Off | permalink
Posted in for:@twitter, for:collidr, hacking, has:for, kernel, kernel.org, Linux, Security | Comments Off | permalink
You are currently browsing the archives for the Computers category.
Konstantin Antselovich (c) 2004-2011
powered by WordPress
Entries (RSS)
and Comments (RSS).