A high performance web server and reverse proxy server
021aed75f8
servers are vulnerable to a DDoS attack (Rapid Reset Attack)(CVE-2023-44487) |
||
---|---|---|
.gitignore | ||
50x.html | ||
404.html | ||
0001-remove-Werror-in-upstream-build-scripts.patch | ||
0002-fix-PIDFile-handling.patch | ||
0003-Support-loading-cert-hardware-token-PKC.patch | ||
0004-Set-proper-compiler-optimalization-level-O2-for-perl.patch | ||
0005-Init-openssl-engine-properly.patch | ||
0006-Fix-ALPACA-security-issue.patch | ||
0007-Enable-TLSv1.3-by-default.patch | ||
gating.yaml | ||
macros.nginxmods.in | ||
maxim.key | ||
mdounin.key | ||
nginx-1.14.0-logs-perm.patch | ||
nginx-1.14.1-perl-module-hardening.patch | ||
nginx-1.16.0-pkcs11.patch | ||
nginx-1.18.0-pkcs11-cert.patch | ||
nginx-1.20.0-enable-tls1v3-by-default.patch | ||
nginx-1.22-CVE-2023-44487.patch | ||
nginx-auto-cc-gcc.patch | ||
nginx-logo.png | ||
nginx-upgrade | ||
nginx-upgrade.8 | ||
nginx.conf | ||
nginx.logrotate | ||
nginx.service | ||
nginx.spec | ||
nginxmods.attr | ||
nginxmods.req | ||
README.dynamic | ||
sb.key | ||
sources | ||
UPGRADE-NOTES-1.6-to-1.10 |
############### Dynamic modules ############### Dynamic modules are loaded using the "load_modules" directive. The RPM package for each module has a '.conf' file in the /usr/share/nginx/modules directory. The '.conf' file contains a single "load_modules" directive. This means that whenever a new dynamic module is installed, it will automatically be enabled and Nginx will be reloaded. -------------------------------------------------------- Prevent dynamic modules from being enabled automatically -------------------------------------------------------- You may want to avoid dynamic modules being enabled automatically. Simply remove this line from the top of /etc/nginx/nginx.conf: include /usr/share/nginx/modules/*.conf;