Timeline
06/09/20:
- 21:02 Ticket #2001 (nginx memory leak URL with large cookies and connections with long ...) updated by
-
Description changed
- 21:00 Ticket #2001 (nginx memory leak URL with large cookies and connections with long ...) updated by
-
Description changed
- 20:53 Ticket #2001 (nginx memory leak URL with large cookies and connections with long ...) updated by
-
Description changed
- 20:44 Ticket #2001 (nginx memory leak URL with large cookies and connections with long ...) created by
- *summary*: Persisting upstream connections for a large number of …
- 19:44 Ticket #1982 (Zero length UDP packets aren't forwarded to upstreams but a lack of ...) closed by
- fixed
- 19:05 Ticket #1982 (Zero length UDP packets aren't forwarded to upstreams but a lack of ...) updated by
- In [changeset:"d127837c714f398e04cc8cf26f922c845fb7a6e8/nginx" …
- 00:44 Ticket #2000 ("upstream sent invalid chunked response while reading upstream" when ...) updated by
- > Just one question tho, why Chrome and other clients correctly …
06/08/20:
- 22:49 Ticket #2000 ("upstream sent invalid chunked response while reading upstream" when ...) updated by
- Thank you very much :) I've updated the issue on the Ktor board. Just …
- 21:26 Ticket #2000 ("upstream sent invalid chunked response while reading upstream" when ...) closed by
- invalid: Relevant part from the log: […] So the upstream server returns a …
- 20:38 Ticket #2000 ("upstream sent invalid chunked response while reading upstream" when ...) updated by
- Hi, Thank you for your time. Indeed I am very new into web protocols …
- 14:15 Changeset in nginx_org [2552:b5aa27db57b4] by
- Regenerated.
- 14:14 Changeset in nginx_org [2551:6fff2b3fd3ce] by
- App-protect promo added.
- 13:31 Ticket #2000 ("upstream sent invalid chunked response while reading upstream" when ...) updated by
- I don't see any nginx-related details in the issue linked except the …
- 08:40 Changeset in nginx [7665:d127837c714f] by
- Stream: fixed processing of zero length UDP packets (ticket #1982).
- 01:29 Ticket #2000 ("upstream sent invalid chunked response while reading upstream" when ...) created by
- A detailed log is available at …
06/07/20:
- 16:30 Ticket #1999 (Fix webdav unable to rename folders and create folders) closed by
- duplicate: Duplicate of #604 (an english explanation can be found in #1966). For …
- 16:25 Ticket #604 (WebDAV: мелкие косяки) updated by
- See also #1999.
- 10:17 Ticket #1999 (Fix webdav unable to rename folders and create folders) created by
- Fix webdav unable to rename folders and create folders in Nginx server …
- 04:27 Ticket #1719 (Enhance proxy_cache_min_uses directive) updated by
- Consider the following scenario: 1. A single resource suddenly …
06/06/20:
- 17:23 Ticket #812 (Fetch OCSP responses on startup, and store across restarts) updated by
- See also #1998.
- 17:23 Ticket #1998 (SSL Stapling not preloading OCSP answer) closed by
- duplicate: The OCSP stapling doesn't imply nor require that stapled OCSP response …
- 13:24 Ticket #1998 (SSL Stapling not preloading OCSP answer) created by
- I use certificates by Let's Encrypt with OCSP MUST STAPLE enabled. …
06/05/20:
- 17:59 Changeset in nginx [8429:8fc9fcf18608]quic by
- Stream ID handling in MAX_STREAM_DATA and STREAM_DATA_BLOCKED.
- 17:59 Changeset in nginx [8428:953cf44708b0]quic by
- Stream ID handling in RESET_STREAM and STOP_SENDING frames.
- 17:59 Changeset in nginx [8427:d437ee1ce81e]quic by
- Reject invalid STREAM ID with STREAM_STATE_ERROR connection error.
- 15:59 Ticket #1997 (Error nginx: [emerg] unknown "upstream_first_byte_time" variable) updated by
- Thanks, Maxim, it's clear now. But this should probably be covered …
- 15:43 Ticket #1997 (Error nginx: [emerg] unknown "upstream_first_byte_time" variable) closed by
- invalid: The [http://nginx.org/r/$upstream_first_byte_time …
- 14:31 Ticket #1997 (Error nginx: [emerg] unknown "upstream_first_byte_time" variable) created by
- Hello! I've added the $upstream_first_byte_time to my log format in …
- 10:20 Changeset in nginx [8426:6ea2f1daedb5]quic by
- Introduced connection error APPLICATION_ERROR from draft-28.
- 10:20 Changeset in nginx [8425:3e38dad3a163]quic by
- Receipt of CONNECTION_CLOSE in 0-RTT is permitted in draft-28.
- 10:20 Changeset in nginx [8424:c70446e3d771]quic by
- Treat receipt of NEW_TOKEN as connection error PROTOCOL_VIOLATION.
06/04/20:
- 17:54 Ticket #1882 (Nginx does not handle asterisk in OPTIONS request) closed by
- wontfix: From RFC point of view, 400 Bad Request is a valid response. Since …
- 17:12 Ticket #1996 (Why is there no Restart=on-failure in systemd unit) created by
- So, nginx failed to start as an upstream DNS provider was not …
- 16:23 Ticket #1250 (Connection reset with low http2_max_requests) updated by
- See also #1544, which is related. Both problems should be solved once …
- 16:23 Ticket #1544 (http/2 downloads broken during reload) updated by
- See also #1250, which is related. Both problems should be solved once …
- 15:20 Ticket #1811 (proxy server,slice+limit_rate,keepalived connection will be delayed to ...) closed by
-
invalid: Feedback timeout.
The description seems to suggest that
limit_rate
… - 14:27 Ticket #1988 (nginx: [emerg] too long parameter, probably missing terminating "'" ...) closed by
- invalid: Feedback timeout.
06/03/20:
- 16:37 Ticket #1991 (Empty response of nginx with ngx_http_perl_module) closed by
- invalid: The problem is that the perl handler sends a response, and then …
- 16:11 Changeset in nginx [7664:699f6e55bbb4] by
- SSL: added verify callback to ngx_ssl_trusted_certificate(). This …
- 13:37 Ticket #1168 (Nginx не корректно обрабатывает опцию max_size в директиве proxy_cache_path) updated by
- For the record, tested the details. On Linux, NFS client mounts …
- 09:37 Ticket #586 (variable support for client_max_body_size) updated by
- Is there a simple workaround how to set a globaly and set it to a …
- 01:00 Ticket #1995 (Regular expression with Unicode property test doesn't match as expected) closed by
- invalid: What you see it the result of the fact that URI characters aren't …
06/02/20:
- 23:55 Ticket #1989 (Nginx not displaying progressive image when in http2) updated by
- Regardless of the protocol used, nginx does not "serve jpg files …
- 22:56 Ticket #1992 (Websocket over HTTP/2 support) updated by
- First of all, two basic things to understand: 1. nginx does not talk …
- 21:38 Ticket #1994 ($CPPFLAGS lost and handling of C++ files broken) closed by
- invalid: The CPPFLAGS variable is to set flags to CPP, C preprocessor (see, for …
- 21:17 Ticket #1993 (--with-ld-opt fails with multiple options) closed by
-
invalid: > Has no one ever linked two libraries to nginx?
The
--with-ld-opt
… - 20:19 Ticket #1995 (Regular expression with Unicode property test doesn't match as expected) created by
- with this server configuration, whose regex pattern relies on Unicode …
- 14:46 Ticket #1994 ($CPPFLAGS lost and handling of C++ files broken) created by
- The handling of cpp files and corresponding flags seems to have …
- 14:38 Ticket #1993 (--with-ld-opt fails with multiple options) updated by
- Well this shouldn't be under documentation, but once it's created …
- 14:22 Ticket #1993 (--with-ld-opt fails with multiple options) created by
- I have been compiling successfully with --with-ld-opt='-lc++', now I …
- 12:59 Changeset in nginx [8423:833898b35b24]quic by
- Decoupled validation of Host and :authority for HTTP/2 and HTTP/3. …
- 11:30 Changeset in nginx-tests [1573:d7e83ce613c2] by
- Tests: unix sockets removal tests on master process exit.
- 11:15 Ticket #1992 (Websocket over HTTP/2 support) created by
- Hello, Will NGINX ever support Websocket over HTTP/2? …
06/01/20:
- 19:34 Ticket #753 (Nginx leaves UNIX domain sockets after SIGQUIT) closed by
- fixed: In [changeset:"7cbf6389194b9170514e514ca7ee495369c9c8ac/nginx" …
- 19:31 Changeset in nginx [7663:7cbf6389194b] by
- Fixed SIGQUIT not removing listening UNIX sockets (closes #753). …
- 17:54 Ticket #1991 (Empty response of nginx with ngx_http_perl_module) created by
- I have to run a very simplistic piece of perl code in response to HTTP …
- 17:19 Changeset in nginx [7662:9c038f5e0464] by
- Fixed removing of listening UNIX sockets when "changing binary". When …
- 16:53 Changeset in nginx [8422:90b02ff6b003]quic by
- Compatibility with BoringSSL master branch. Recently BoringSSL …
- 16:16 Changeset in nginx [8421:c206233d9c29]quic by
- Fixed transport parameters on a new connection with a valid token. …
- 11:36 Changeset in nginx-tests [1572:f5a3b70c0f2f] by
- Tests: fixed ssl_verify_client.t with LibreSSL. LibreSSL started …
- 03:05 Ticket #1480 (Automatic Let's Encrypt certificate provisioning and renewal) updated by
- any traction on this yet? this would be great to have, especially to …
05/31/20:
- 17:00 Ticket #1990 (proxy_cache_min_uses not counted per variant on initial requests) updated by
- I should note that these examples assume a simple caching proxy …
- 07:44 Ticket #1990 (proxy_cache_min_uses not counted per variant on initial requests) created by
-
When
proxy_cache_min_uses
is set to a value greater than 1, and …
05/30/20:
- 01:46 Ticket #1989 (Nginx not displaying progressive image when in http2) created by
-
When I add
ssl http2
inlisten
tag, nginx does not serve jpg files …
05/29/20:
- 20:10 Changeset in nginx-tests [1571:1b4ceab9cb1c] by
- Tests: fixed ssl_certificate.t with LibreSSL client. …
- 12:07 Changeset in nginx [8418:8b4a0a752723]quic by
- Made NGX_QUIC_DRAFT_VERSION tunable from configure parameters. Now it …
- 12:06 Changeset in nginx [8417:6633f17044eb]quic by
- QUIC draft-28 transport parameters support. Draft-27 and draft-28 …
- 10:29 Changeset in nginx [8419:cb149fa03367]quic by
- Added propagation of the "wildcard" flag to c->listening. The flags …
- 10:05 Changeset in nginx [8416:78e362f0b081]quic by
- Introduced macros for building length-value transport parameters.
- 09:56 Changeset in nginx [8415:125cbfa77013]quic by
- Renamed max_packet_size to max_udp_payload_size, from draft-28. No …
- 09:55 Changeset in nginx [8414:49a98760afd2]quic by
- Rejected forbidden transport parameters with TRANSPORT_PARAMETER_ERROR.
- 09:50 Changeset in nginx [8413:f27fdf86275d]quic by
- Fixed return codes in ngx_quic_add_handshake_data() callback.
- 09:42 Changeset in nginx [8420:2bf17a829ddc]quic by
- Require ":authority" or "Host" in HTTP/3 and HTTP/2 requests. Also, …
05/28/20:
- 22:17 Changeset in nginx_org [2550:43e87e973560] by
- Added info about the Unit 1.18.0 release.
- 17:49 Milestone unit-1.18 completed
- Planned features and enhancements: * URI enconding support * "target" …
- 14:05 Ticket #1988 (nginx: [emerg] too long parameter, probably missing terminating "'" ...) updated by
- The message suggests there is an error in your configuration file: a …
- 04:03 Ticket #1988 (nginx: [emerg] too long parameter, probably missing terminating "'" ...) created by
- Hello Team, I am getting this error when trying to reload my nginx …
05/27/20:
- 18:08 Ticket #1523 (large_client_header_buffers directive is ignored in server context) updated by
- See also #1987 to emphasize "might instead be a source of confusion" …
- 18:04 Ticket #1987 (underscores_in_headers directive seems to be specific to each server block) updated by
- The comment is an inaccurate attempt to explain that …
- 17:28 Ticket #1987 (underscores_in_headers directive seems to be specific to each server block) created by
- The following comment: If the directive is specified on the server …
- 04:38 Ticket #1982 (Zero length UDP packets aren't forwarded to upstreams but a lack of ...) updated by
- The issue came from a production deployment of a radius service. An …
05/26/20:
- 19:03 Changeset in nginx [7660:d33e17499088] by
- Version bump.
- 17:41 Changeset in nginx [8412:4ea302a47d28]quic by
- README: update after merging 1.19.0.
- 17:26 Changeset in nginx [8411:7995cd199b52]quic by
- Merged with the default branch.
- 16:17 Changeset in nginx [7661:8cadaf7e7231] by
- Contrib: vim syntax, update core and 3rd party module directives.
- 15:06 Milestone nginx-1.19.0 completed
- Status: scheduled Trunk: mainline * OCSP validation for the …
- 15:05 Changeset in nginx_org [2549:c13a55aae487] by
- nginx-1.19.0
- 15:00 Changeset in nginx [7659:d78400b2fa93] by
- release-1.19.0 tag
- 15:00 Changeset in nginx [7658:cbe6ba650211]release-1.19.0 by
- nginx-1.19.0-RELEASE
- 14:01 Ticket #1981 (no logging of HTTP/1.x requests to a plain text HTTP/2 listening socket) closed by
- fixed: Patch committed, 7114d21bc2b1. Thanks for prodding this.
- 13:52 Ticket #1330 (OCSP stapling non-functional on IPv6-only host) updated by
- For the record. It looks like my initial analysis in comment:1 was …
- 06:44 Ticket #1330 (OCSP stapling non-functional on IPv6-only host) closed by
- fixed
05/25/20:
- 19:53 Ticket #1986 (Proxy SSL Verify) updated by
-
Description changed
- 19:52 Ticket #1986 (Proxy SSL Verify) closed by
- invalid: For questions, please use [http://nginx.org/en/support.html support …
- 19:50 Ticket #1986 (Proxy SSL Verify) created by
- What are the verification steps involved in the …
- 19:10 Changeset in nginx [7657:02f2f129abc0] by
- Updated OpenSSL used for win32 builds.
- 17:39 Ticket #1330 (OCSP stapling non-functional on IPv6-only host) updated by
- In 7652:7cffd81015e7/nginx: OCSP stapling: iterate over all responder …
- 17:37 Ticket #1534 (OCSP client certificate validation) closed by
- fixed: Fix committed.
- 17:36 Ticket #1534 (OCSP client certificate validation) updated by
- In 7653:8409f9df6219/nginx: SSL: client certificate validation with …
- 15:37 Changeset in nginx [8410:c7d1b500bd0a]quic by
- Updated README with "Contributing" section and draft details.
- 15:33 Changeset in nginx [7656:7114d21bc2b1] by
- HTTP/2: invalid connection preface logging (ticket #1981). …
05/23/20:
- 14:15 Ticket #1535 (proxy_bind and resolver IP version mismatch) updated by
- Replying to [comment:4 …
- 12:53 Changeset in nginx [7655:bd4d1b9db0ee] by
- Fixed format specifiers.
- 11:41 Changeset in nginx [8402:af22b60a905b]quic by
- README: documented Retry, 0-RTT, TLSv1.3 configuration.
05/22/20:
- 17:35 Changeset in nginx [7652:7cffd81015e7] by
- OCSP stapling: iterate over all responder addresses. Previously only …
- 17:17 Ticket #196 (Inconsistent behavior on uri's with unencoded spaces followed by H) updated by
-
uname -a changed
See also #1985. - 17:17 Ticket #1985 (No header response in 400 Bad Request) closed by
- duplicate: As already explained in …
- 15:29 Ticket #1985 (No header response in 400 Bad Request) created by
- When sending bad requests like […] Nginx will response 400 Bad …
- 15:22 Changeset in nginx [8396:94c06fe6e159]quic by
- README: pointed out Alt-Svc "ma" parameter useful with curl.
- 15:16 Changeset in nginx [8395:578563babbd1]quic by
- Fixed a typo.
- 15:14 Changeset in nginx [8400:d96ddef458cd]quic by
- Added sending of extra CONNECTION_CLOSE frames. According to …
- 15:08 Changeset in nginx [8399:ffd362e87eb2]quic by
- Added more context to CONNECTION CLOSE frames. Now it is possible to …
- 14:30 Changeset in nginx [7653:8409f9df6219] by
- SSL: client certificate validation with OCSP (ticket #1534). OCSP …
- 14:25 Changeset in nginx [7654:b56f725dd4bb] by
- OCSP: certificate status cache. When enabled, certificate status is …
- 14:06 Ticket #1984 (Nginx module installation issue) closed by
- wontfix: nginx-0.8.54 is an old enough version, you'd need at least nginx-1.5.2.
- 13:41 Ticket #1984 (Nginx module installation issue) created by
- - When I want to install the Nginx module that time accrued issue. …
- 11:18 Ticket #1808 (Inconsistent encoding in rewrites) updated by
- See https://github.com/kubernetes/ingress-nginx/issues/5576 for a …
- 11:14 Ticket #1535 (proxy_bind and resolver IP version mismatch) updated by
- Hi! Been there done that ! proxy_bind does randomly behave weird …
- 09:47 Ticket #1808 (Inconsistent encoding in rewrites) updated by
- You can do this for redirects: […] and this for proxying […] …
05/21/20:
- 12:48 Changeset in nginx [8401:d3aa54242c37]quic by
- Style. Rephrased error message and removed trailing space. Long …
- 12:41 Changeset in nginx [8398:8bec0ac23cf9]quic by
- Fixed retransmission of frames after closing connection. Frames in …
- 12:38 Changeset in nginx [8397:1245e274b9ba]quic by
- Avoided excessive definitions for connection state. There is no need …
- 12:11 Ticket #1982 (Zero length UDP packets aren't forwarded to upstreams but a lack of ...) updated by
-
Status changed
Yes, indeed such packets aren't forwarded currently. Did you hit the … - 11:53 Ticket #1808 (Inconsistent encoding in rewrites) updated by
- Bug still exists in 1.18.0. It seems that it's only the first …
05/20/20:
- 14:06 Ticket #724 (Init script does not check config on reload for Ubuntu mainline packages) updated by
- See also #1983.
- 14:06 Ticket #1983 (nginx.service unit-file in rpm (CentOS 7,8)) closed by
- duplicate: The "nginx -s reload" does not have an exit code either, it's just a …
- 13:32 Ticket #1983 (nginx.service unit-file in rpm (CentOS 7,8)) created by
- Hi In an unit-file nginx.server (from RPM packages for CentOS 7,8) I …
- 12:36 Changeset in nginx [8394:df18ae7161b8]quic by
- Assorted fixes. Found by Clang Static Analyzer.
- 12:04 Changeset in nginx-tests [1570:0077b80ef745] by
- Tests: ssl_ocsp tests.
- 07:00 Ticket #1982 (Zero length UDP packets aren't forwarded to upstreams but a lack of ...) created by
- Using wireshark I can see that zero length packets aren't forwarded to …
05/19/20:
- 14:05 Changeset in nginx_org [2547:baf8cbfa3df1] by
- njs-0.4.1.
- 14:05 Changeset in nginx_org [2546:6093e9f3615e] by
- Documented rawHeadersIn and rawHeadersOut in njs.
- 14:05 Changeset in nginx_org [2545:dca5a7053a6c] by
- Sorted alphabetically njs http methods.
- 14:05 Changeset in nginx_org [2544:33347df1da9c] by
- Relocated sentence in r.headers.Out, added dot, corrected quotes.
- 14:05 Changeset in nginx_org [2543:f39c4724c0f8] by
- Described multi-value headers in r.headersIn.
- 13:36 Milestone njs-0.4.1 completed
- Planned features and enhancements: * headersIn and raw headers API * …
- 13:20 Changeset in nginx [8408:5b367070cc9c]quic by
- Fixed client buffer reallocation for HTTP/3. Preserving pointers …
- 12:47 Changeset in nginx [8407:d6feece1288a]quic by
- Fixed $request_length for HTTP/3. New field r->parse_start is …
- 12:41 Changeset in nginx [8403:c101438c69a4]quic by
- HTTP/3: prevent array access by negative index for unknown streams. …
- 12:34 Changeset in nginx [8406:66feab03d9b7]quic by
- HTTP/3: restricted symbols in header names. As per HTTP/3 draft 27, a …
- 12:29 Changeset in nginx [8405:d2759e4cc437]quic by
- HTTP/3: split header parser in two functions. The first one parses …
- 11:54 Changeset in nginx_org [2542:bde7cd9a1173] by
- Added examples of state path to keyval.
- 11:43 Changeset in nginx_org [2548:ffc4083f5c7e] by
- Documented ssl_ocsp, ssl_ocsp_cache, ssl_ocsp_responder directives.
05/18/20:
- 19:10 Ticket #808 (Defining http2 without ssl leads to HTTP/1.1 client failure) updated by
- See also #1981.
- 19:09 Ticket #1981 (no logging of HTTP/1.x requests to a plain text HTTP/2 listening socket) updated by
-
Status, Summary changed
You were given an explanation (see ticket:1979#comment:1), and … - 17:49 Ticket #1981 (no logging of HTTP/1.x requests to a plain text HTTP/2 listening socket) created by
- Hi, two days ago you closed my ticket without offering me further …
- 14:11 Ticket #1980 (custom 401 error_page with auth_basic never shows the custom 401 page) updated by
- Replying to mmattel@…: > One thing pop´s up. When …
- 11:41 Ticket #1980 (custom 401 error_page with auth_basic never shows the custom 401 page) updated by
- Your example works. I do not know what went wrong on my side that this …
- 10:54 Changeset in nginx [8393:e169cce912c7]quic by
- Avoid retransmitting of packets with discarded keys. Sections 4.10.1 …
- 10:54 Changeset in nginx [8392:5ffb21c5c93d]quic by
- Fixed frame retransmissions. It was possible that retransmit timer …
- 01:03 Ticket #1869 (Wrong client IP in errors logged early in request processing when ...) updated by
- See also #1978, which is somewhat similar.
- 01:02 Ticket #1978 (Logging real client IP on invalid request) closed by
- wontfix: As long as there is a syntax error in the request line, nginx does not …
05/17/20:
- 16:17 Ticket #1980 (custom 401 error_page with auth_basic never shows the custom 401 page) closed by
- worksforme: Works fine here. Example configuration: […] Test request: […] …
- 16:02 Ticket #808 (Defining http2 without ssl leads to HTTP/1.1 client failure) updated by
- See also #1979.
- 16:02 Ticket #1979 (listen 80 http2; combined with proxy_pass http:// brakes website) closed by
-
duplicate: Using
listen ... http2;
withoutssl
configures listening socket to … - 13:28 Ticket #1980 (custom 401 error_page with auth_basic never shows the custom 401 page) updated by
- Not a documentation ticket -> core
- 13:16 Ticket #1980 (custom 401 error_page with auth_basic never shows the custom 401 page) created by
- When using auth_basic (works great) and defining a custom 401 error …
- 11:24 Changeset in nginx [7651:6ca8e15caf1f] by
- OCSP stapling: keep extra chain in the staple object.
05/16/20:
- 20:42 Ticket #1979 (listen 80 http2; combined with proxy_pass http:// brakes website) updated by
- thank you for your wonderful server and hope I am not wasting your time.
- 20:40 Ticket #1979 (listen 80 http2; combined with proxy_pass http:// brakes website) created by
- Hi, I do not know if this is how nginx should behave, but it …
- 16:36 Ticket #1535 (proxy_bind and resolver IP version mismatch) updated by
- Hi! Adding support for several IPs would solve the whole issue. When …
- 06:51 Ticket #1978 (Logging real client IP on invalid request) created by
- We run nginx behind a proxy, which sets the X-Forwarded-For header …
05/15/20:
- 15:22 Changeset in nginx_org [2541:0e6bbd8138c4] by
- Added article about TypeScript in njs.
05/14/20:
- 18:04 Ticket #1971 (Invalid 200 (OK) response code to range request) updated by
- Any valid client is expected to handle 200 anyway, as servers are not …
- 17:39 Ticket #1971 (Invalid 200 (OK) response code to range request) updated by
- Frankly, this is a weird approach to use "...may ignore..." clause …
- 15:34 Ticket #1977 (Implement TLS 1.3 random record padding to mitigate BREACH) updated by
-
Priority changed
I believe it was demonstrated more than once that padding cannot … - 15:10 Changeset in nginx [8391:2d5db7faa788]quic by
- Removed outdated debug.
- 14:22 Changeset in nginx [8390:70dbd7d0e466]quic by
- Fixed a typo.
- 13:33 Changeset in nginx [8389:2b580ac17a47]quic by
- README: Retry support, protocol error messages implemented.
- 13:02 Changeset in nginx [8409:26cb2f3259b1]quic by
- HTTP/3: reallocate strings inserted into the dynamic table. They …
- 12:54 Changeset in nginx [8385:fb7422074258]quic by
- Added generation of CC frames with error on connection termination. …
- 12:47 Changeset in nginx [8384:52d0c4832570]quic by
- Address validation using NEW_TOKEN frame.
- 12:47 Changeset in nginx [8383:7ea34e13937f]quic by
- Address validation using Retry packets. The behaviour is toggled with …
- 11:49 Changeset in nginx [8404:e5d4f057a6cb]quic by
- HTTP/3: move body parser call out of ngx_http_parse_chunked(). The …
- 11:49 Changeset in nginx [8387:eebdda507ec3]quic by
- Added tests for connection id lengths in initial packet.
- 00:58 Ticket #1977 (Implement TLS 1.3 random record padding to mitigate BREACH) updated by
-
Description changed
- 00:56 Ticket #1977 (Implement TLS 1.3 random record padding to mitigate BREACH) created by
- The TLS specification (RFC 8446) section 5.4 defines optional Record …
05/13/20:
- 22:06 Changeset in nginx [8386:81f85c479d7e]quic by
- Discard packets without fixed bit or reserved bits set. Section 17.2 …
- 21:17 Ticket #698 (Add an option to proxy_cache_path that allows to set group permissions) closed by
- wontfix: Permissions are set on the cache directory and files in a such way …
- 15:34 Changeset in nginx [8382:b7704303a7e5]quic by
- Server CID change refactored.
- 10:01 Ticket #1888 (Nginx cache has multiple formats, and many of them are invalid during ...) updated by
- It is hoped that the cache file can be deleted through del, and key …
05/12/20:
- 21:06 Changeset in nginx_org [2540:b686736680e3] by
- Documented escaping rules in log_format.
- 15:45 Changeset in nginx [8388:a9cc1627cf1c]quic by
- Fixed time comparison.
- 15:18 Changeset in nginx [8381:6e100d8c138a]quic by
- Preserve original DCID and unbreak parsing 0-RTT packets. As per QUIC …
- 14:54 Ticket #972 (Clarify $arg_name and $args in embedded variables documentation) closed by
-
wontfix: The
$arg
, also known as$query_string
, represents query string as …
05/10/20:
- 17:32 Ticket #1970 (ssl_ecdh_curve avoid 0-RTT) closed by
- duplicate: Duplicate of #1969.
- 17:32 Ticket #1969 (ssl_ecdh_curve avoid 0-RTT) closed by
- invalid: This does not look like a bug in nginx, but rather a question about …
- 17:11 Ticket #1975 (Certificates in ssl_trusted_certificate doesn't have to be CA, docs ...) closed by
- wontfix: While strictly speaking you are right, and this can be used as a …
- 16:46 Ticket #1976 (Nginx DNS cache issue. ngx_http_core_module valid config is not working.) closed by
- invalid: Domain names used in nginx configuration are normally resolved during …
- 16:25 Ticket #1974 (Custom variable not written to access_log when nginx.status is 400) closed by
- invalid: When a 400 error occurs before request processing starts - for …
- 16:17 Ticket #1384 (request body may be corrupted when content-length is not set in ...) updated by
- See also #1973.
- 16:17 Ticket #1973 (Intermittent form body loss with concurrent HTTP2 POST requests) closed by
- duplicate: The 1.10.3 is the version obsolete more than 3 years ago. Further, in …
- 15:48 Ticket #1972 (Use of IRIs in redirect responses causes nginx to violate HTTP RFCs) closed by
-
wontfix: It certainly shouldn't auto-punycode. The
return
directive return …
Note:
See TracTimeline
for information about the timeline view.