mastodon.green is one of the many independent Mastodon servers you can use to participate in the fediverse.
Plant trees while you use Mastodon. A server originally for people in the EU, but now open for anyone in the world

Administered by:

Server stats:

1.2K
active users

#nginx

12 posts10 participants1 post today
seungjin<p>First switched from <a href="https://mstd.seungjin.net/tags/Nginx" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Nginx</span></a> to Ferron(<a href="https://mstd.seungjin.net/tags/ferronweb" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ferronweb</span></a>) on one of my personal servers.</p>
jexner<p>When you self-host immich behind an nginx reverse proxy, be aware that the nginx default configuration blocks uploads of big files!</p><p>I fell into that trap!</p><p><a href="https://discussion.scottibyte.com/t/immich-how-to-bust-the-upload-limits/475" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">discussion.scottibyte.com/t/im</span><span class="invisible">mich-how-to-bust-the-upload-limits/475</span></a></p><p><a href="https://tooting.ch/tags/immich" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>immich</span></a> <a href="https://tooting.ch/tags/nginx" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nginx</span></a></p>
Problem Fox<a class="hashtag" href="https://corteximplant.net/tag/smolweb" rel="nofollow noopener noreferrer" target="_blank">#smolWeb</a> wins. My first attempt at setting up <a class="hashtag" href="https://corteximplant.net/tag/certbot" rel="nofollow noopener noreferrer" target="_blank">#certbot</a> and configuring it to automatically renew the certs for my site on my <a class="hashtag" href="https://corteximplant.net/tag/permacomputing" rel="nofollow noopener noreferrer" target="_blank">#permacomputing</a> based <a class="hashtag" href="https://corteximplant.net/tag/nginx" rel="nofollow noopener noreferrer" target="_blank">#nginx</a> server has worked! We've passed the expiration date of the initial cert by several days and a valid cert is there for the sites!<br><br>Just don't ask me to set it up again in a hurry :blobcat_code:
Bob<p><a href="https://mastodon.acc.sunet.se/tags/TIL" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TIL</span></a> <a href="https://mastodon.acc.sunet.se/tags/nginx" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nginx</span></a> has a `random_index` directive. Pointing this at a folder with images can be used in static websites to get random background images (or similar shenanigans).</p><p><a href="https://mastodon.acc.sunet.se/tags/selfhosting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>selfhosting</span></a> <a href="https://mastodon.acc.sunet.se/tags/selfhosted" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>selfhosted</span></a></p>
FrankM<p>Ein neuer Forumbeitrag: <a href="https://linux-nerds.org/topic/1689/ai-bots-aussperren" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">linux-nerds.org/topic/1689/ai-</span><span class="invisible">bots-aussperren</span></a> <a href="https://nrw.social/tags/linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linux</span></a> <a href="https://nrw.social/tags/block" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>block</span></a>-ai <a href="https://nrw.social/tags/nginx" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nginx</span></a></p>
Problem FoxTried to remote SSH into my <a class="hashtag" href="https://corteximplant.net/tag/raspberrypi" rel="nofollow noopener noreferrer" target="_blank">#RaspberryPi</a> earlier and couldn't get in. The connection was closed by the server. My <a class="hashtag" href="https://corteximplant.net/tag/agate" rel="nofollow noopener noreferrer" target="_blank">#Agate</a> <a class="hashtag" href="https://corteximplant.net/tag/geminiprotocol" rel="nofollow noopener noreferrer" target="_blank">#geminiProtocol</a> server didn't respond, and <a class="hashtag" href="https://corteximplant.net/tag/nginx" rel="nofollow noopener noreferrer" target="_blank">#nginx</a> was there but returned 404 for my <a class="hashtag" href="https://corteximplant.net/tag/smolweb" rel="nofollow noopener noreferrer" target="_blank">#smolWeb</a> site.<br><br>Just tried physically turning it off and on again and it sat dead. <br><br>So I disconnected everything, blew on the SD card pins, tried again. As if by magic everything is working perfectly.<br><br>I hate it when it just restarts and you can't find out why it stopped.
Me 🐶<p><span class="h-card" translate="no"><a href="https://techhub.social/@negative12dollarbill" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>negative12dollarbill</span></a></span> <a href="https://techhub.social/tags/nginx" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nginx</span></a> keeps popping up in my findings, i may start with it</p>
Felix Palmen :freebsd: :c64:<p>Just released: <a href="https://mastodon.bsd.cafe/tags/swad" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>swad</span></a> v0.2</p><p>SWAD is the "Simple Web Authentication Daemon", meant to add <a href="https://mastodon.bsd.cafe/tags/cookie" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cookie</span></a> <a href="https://mastodon.bsd.cafe/tags/authentication" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>authentication</span></a> with a simple <a href="https://mastodon.bsd.cafe/tags/login" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>login</span></a> form and configurable credential checker modules to a reverse <a href="https://mastodon.bsd.cafe/tags/proxy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>proxy</span></a> supporting to delegate authentication to a backend service, like e.g. <a href="https://mastodon.bsd.cafe/tags/nginx" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nginx</span></a>' "auth_request". It's a very small piece of software written in pure <a href="https://mastodon.bsd.cafe/tags/C" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>C</span></a> with as little external dependencies as possible. It requires some <a href="https://mastodon.bsd.cafe/tags/POSIX" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>POSIX</span></a> (or "almost POSIX", like <a href="https://mastodon.bsd.cafe/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a>, <a href="https://mastodon.bsd.cafe/tags/FreeBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FreeBSD</span></a>, ...) environment, OpenSSL (or LibreSSL) for TLS and zlib for response compression.</p><p>Currently, the only credential checker module available offers <a href="https://mastodon.bsd.cafe/tags/PAM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PAM</span></a> authentication, more modules will come in later releases.</p><p>swad 0.2 brings a few bugfixes and improvements, especially helping with security by rate-limiting the creation of new sessions as well as failed login attempts. Read details and grab it here:</p><p><a href="https://github.com/Zirias/swad/releases/tag/v0.2" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/Zirias/swad/release</span><span class="invisible">s/tag/v0.2</span></a></p>
HortusFox<p>Here is a very great overview and installation video of HortusFox - including how to deploy via portainer! Thanks to SYNACK Time for giving HortusFox a spotlight. 🌱 💚 </p><p><a href="https://www.youtube.com/watch?v=cen1itF1374" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">youtube.com/watch?v=cen1itF1374</span><span class="invisible"></span></a></p><p><a href="https://mastodon.social/tags/opensource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opensource</span></a> <a href="https://mastodon.social/tags/foss" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>foss</span></a> <a href="https://mastodon.social/tags/selfhosted" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>selfhosted</span></a> <a href="https://mastodon.social/tags/selfhosting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>selfhosting</span></a> <a href="https://mastodon.social/tags/docker" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>docker</span></a> <a href="https://mastodon.social/tags/portainer" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>portainer</span></a> <a href="https://mastodon.social/tags/nginx" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nginx</span></a> <a href="https://mastodon.social/tags/hosting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hosting</span></a> <a href="https://mastodon.social/tags/deployment" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>deployment</span></a> <a href="https://mastodon.social/tags/gardening" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>gardening</span></a> <a href="https://mastodon.social/tags/botany" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>botany</span></a> <a href="https://mastodon.social/tags/horticulture" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>horticulture</span></a> <a href="https://mastodon.social/tags/plants" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>plants</span></a> <a href="https://mastodon.social/tags/plantparent" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>plantparent</span></a> <a href="https://mastodon.social/tags/indoorplants" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>indoorplants</span></a> <a href="https://mastodon.social/tags/houseplants" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>houseplants</span></a> <a href="https://mastodon.social/tags/outdoorplants" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>outdoorplants</span></a></p>
Felix Palmen :freebsd: :c64:<p>Released: <a href="https://mastodon.bsd.cafe/tags/swad" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>swad</span></a> v0.1 🥳 </p><p>Looking for a simple way to add <a href="https://mastodon.bsd.cafe/tags/authentication" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>authentication</span></a> to your <a href="https://mastodon.bsd.cafe/tags/nginx" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nginx</span></a> reverse proxy? Then swad *could* be for you!</p><p>swad is the "Simple Web Authentication Daemon", written in pure <a href="https://mastodon.bsd.cafe/tags/C" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>C</span></a> (+ <a href="https://mastodon.bsd.cafe/tags/POSIX" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>POSIX</span></a>) with almost no external dependencies. <a href="https://mastodon.bsd.cafe/tags/TLS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TLS</span></a> support requires <a href="https://mastodon.bsd.cafe/tags/OpenSSL" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenSSL</span></a> (or <a href="https://mastodon.bsd.cafe/tags/LibreSSL" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LibreSSL</span></a>). It's designed to work with nginx' "auth_request" module and offers authentication using a <a href="https://mastodon.bsd.cafe/tags/cookie" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cookie</span></a> and a login form.</p><p>Well, this is a first release and you can tell by the version number it isn't "complete" yet. Most notably, only one single credentials checker is implemented: <a href="https://mastodon.bsd.cafe/tags/PAM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PAM</span></a>. But as pam already allows pretty flexible configuration, I already consider this pretty useful 🙈</p><p>If you want to know more, read here:<br><a href="https://github.com/Zirias/swad" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/Zirias/swad</span><span class="invisible"></span></a></p>
Felix Palmen :freebsd: :c64:<p><a href="https://mastodon.bsd.cafe/tags/Documentation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Documentation</span></a> ... better start early I guess. What would you think of this sample <a href="https://mastodon.bsd.cafe/tags/configuration" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>configuration</span></a> file?</p><p>Hint: the tokens surrounded by %% will be replaced by my build system before installing this thing.</p><p>For context, this is a web <a href="https://mastodon.bsd.cafe/tags/authentication" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>authentication</span></a> service offering cookie+forms login meant for e.g. <a href="https://mastodon.bsd.cafe/tags/nginx" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nginx</span></a>' "auth_request".</p><p><a href="https://mastodon.bsd.cafe/tags/C" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>C</span></a> <a href="https://mastodon.bsd.cafe/tags/coding" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>coding</span></a></p>
Felix Palmen :freebsd: :c64:<p>DId lots of smaller improvements to <a href="https://mastodon.bsd.cafe/tags/swad" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>swad</span></a> ... but first, I had to hunt down a crash 🤯. Finally found it was caused by my <a href="https://mastodon.bsd.cafe/tags/poser" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>poser</span></a> lib (to be fixed later): A connection there can resolve the hostname of a remote end and does so in a thread job to avoid blocking. If the connection dies meanwhile, the job is canceled. Seems my canceling mechanism relying on a signal to the thread is, well, not reliable (the signal can arrive delayed). Ok, for now just disabled name resolution to sidestep that.</p><p>Now, integration with <a href="https://mastodon.bsd.cafe/tags/nginx" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nginx</span></a> is much better. I intrdoduced (optional) custom headers to transport the authentication realm and the redirect URI, plus state management in the session, so these can be passed to the "auth" endpoint. This requires to make sure nginx always passes the session <a href="https://mastodon.bsd.cafe/tags/cookie" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cookie</span></a>, Unfortunately, I still need a "hacky" redirect configuration for login in nginx. If auth_request could just pass the response body, this would be unnecessary .... 🙄 </p><p>The nginx configuration shows <a href="https://mastodon.bsd.cafe/tags/swad" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>swad</span></a> running on "files" and another nginx running on "wwwint" serving <a href="https://mastodon.bsd.cafe/tags/poudriere" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>poudriere</span></a> output there. This nginx instance helpfully adds cache hints, which I have to override, so a redirect works as expected when for example the swad session times out.</p><p><a href="https://mastodon.bsd.cafe/tags/C" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>C</span></a> <a href="https://mastodon.bsd.cafe/tags/coding" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>coding</span></a></p>
Martin Owens :inkscape:<p>I've set up my new <a href="https://floss.social/tags/inkscape" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>inkscape</span></a> website AI bot trap. It works by giving everyone a chance to not fall into it.</p><p>An anchor link that says "I am a bot" and links to /P3W-451/{datetime}/ it's got a fixed position at top -100px so should never be seen</p><p>The robots.txt says "Disallow: /P3W-451/" so if you were reading the robots, you'd know.</p><p>Then <a href="https://floss.social/tags/nginx" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nginx</span></a> logs the requests to a log of their ip-addresses and browser strings and sends them a 301 redirect to google.com</p><p><a href="https://floss.social/tags/ai" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ai</span></a> <a href="https://floss.social/tags/Scraping" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Scraping</span></a> </p><p>1/2</p>
Felix Palmen :freebsd: :c64:<p>First "production test" successful 💪 ... after band-aid "deployment" (IOW, scp binaries to the prod jail).</p><p><a href="https://mastodon.bsd.cafe/tags/swad" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>swad</span></a> integrates with <a href="https://mastodon.bsd.cafe/tags/nginx" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nginx</span></a> exactly as I planned it. And <a href="https://mastodon.bsd.cafe/tags/PAM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PAM</span></a> authentication using a child process running as root also just works (while the main process dropped privileges). 🥳 </p><p>So, I guess I can say goodbye to <a href="https://mastodon.bsd.cafe/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a> <a href="https://mastodon.bsd.cafe/tags/bots" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bots</span></a> hammering my poor DSL connection just to download poudriere build logs.</p><p>Still a lot to do for <a href="https://mastodon.bsd.cafe/tags/swad" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>swad</span></a>: Make it nicer. So many ideas. Best start would probably be to implement more credentials checking modules besides PAM.</p><p><a href="https://mastodon.bsd.cafe/tags/C" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>C</span></a> <a href="https://mastodon.bsd.cafe/tags/coding" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>coding</span></a></p>
Daniel ⏚<p>Si ça continue, nous bloquerons Azure, AWS et consort 😡</p><p><a href="https://mastodon.eole.education/tags/intelligenceArtificielle" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>intelligenceArtificielle</span></a> <a href="https://mastodon.eole.education/tags/ia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ia</span></a> <a href="https://mastodon.eole.education/tags/web" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>web</span></a> <a href="https://mastodon.eole.education/tags/sysadmin" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sysadmin</span></a> <a href="https://mastodon.eole.education/tags/netadmin" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>netadmin</span></a> <a href="https://mastodon.eole.education/tags/kubernetes" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>kubernetes</span></a> <a href="https://mastodon.eole.education/tags/nginx" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nginx</span></a> <a href="https://mastodon.eole.education/tags/ingressNginx" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ingressNginx</span></a></p>
SeanBurlington<p>Upgrading Nginx-Ingress did not go smoothly today </p><p>It worked, but I had to deviate from the recommended steps - without really having time to figure out why.</p><p>My Notes here </p><p><a href="https://tangiblebytes.co.uk/2025/kubernetes-nginx-ingress-cve-2025-1974/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">tangiblebytes.co.uk/2025/kuber</span><span class="invisible">netes-nginx-ingress-cve-2025-1974/</span></a></p><p><a href="https://mastodon.me.uk/tags/kubernetes" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>kubernetes</span></a> <a href="https://mastodon.me.uk/tags/nginx" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nginx</span></a> <a href="https://mastodon.me.uk/tags/CVE_2025_1974" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CVE_2025_1974</span></a> <a href="https://mastodon.me.uk/tags/helm" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>helm</span></a></p>
Jessie Nabein :neofox_peek_owo:<p>I finally poked at my nginx logs, because generally nothing happens on my servers</p><pre><code>202.155.137.157 - - [30/Mar/2025:00:53:00 +0100] "GET /mirrors-JapanMapTranslate-github/patch/bin/kanaconv/HiraganaConverterImpl.class?id=c1c09efe21a09ecbd6f95641c8a0086ec538ae39 HTTP/1.1" 200 663 "-" "Mozilla/5.0 (Macintosh; U; PPC Mac OS X; en-us) AppleWebKit/312.5 (KHTML, like Gecko) Safari/312.3"<br></code></pre><p>yeah... yeah... ok... this bitch is accessing ONE specific file as Power PC Mac OS X ???</p><p>get the fuck outta here.</p><pre><code>% Information related to '202.155.137.0/24AS212238'<br><br>route: 202.155.137.0/24<br>origin: AS212238<br>descr: CV. Rumahweb Indonesia<br> Jl. Arimbi No. 482<br> Kel. Banguntapan, Kec. Banguntapan<br>mnt-by: MAINT-CRI-ID<br>last-modified: 2025-02-25T00:03:14Z<br>source: APNIC<br><br></code></pre><p><a href="https://wetdry.world/tags/NoAI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NoAI</span></a> <a href="https://wetdry.world/tags/NGINX" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NGINX</span></a> <a href="https://wetdry.world/tags/networking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>networking</span></a></p>
Xavier «X» Santolaria :verified_paw: :donor:<p>📨 Latest issue of my curated <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> and <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> list of resources for week #13/2025 is out!</p><p>It includes the following and much more:</p><p>➝ DNA of 15 Million People for Sale in <a href="https://infosec.exchange/tags/23andMe" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>23andMe</span></a> Bankruptcy,</p><p>➝ <a href="https://infosec.exchange/tags/Trump" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Trump</span></a> administration accidentally texted a journalist its war plans,</p><p>➝ Critical Ingress <a href="https://infosec.exchange/tags/NGINX" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NGINX</span></a> controller vulnerability allows RCE without authentication,</p><p>➝ <a href="https://infosec.exchange/tags/Cyberattack" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cyberattack</span></a> hits Ukraine's state railway,</p><p>➝ Troy Hunt's Mailchimp account was successfully phished,</p><p>➝ <a href="https://infosec.exchange/tags/OpenAI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenAI</span></a> Offering $100K Bounties for Critical <a href="https://infosec.exchange/tags/Vulnerabilities" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Vulnerabilities</span></a>,</p><p>➝ <a href="https://infosec.exchange/tags/Meta" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Meta</span></a> AI is now available in <a href="https://infosec.exchange/tags/WhatsApp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WhatsApp</span></a> for users in 41 European countries... and cannot be turned off</p><p>Subscribe to the <a href="https://infosec.exchange/tags/infosecMASHUP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosecMASHUP</span></a> newsletter to have it piping hot in your inbox every week-end ⬇️</p><p><a href="https://infosec-mashup.santolaria.net/p/infosec-mashup-13-2025" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">infosec-mashup.santolaria.net/</span><span class="invisible">p/infosec-mashup-13-2025</span></a></p>
Felix Palmen :freebsd: :c64:<p>Trying to come up with my own little self-hosted <a href="https://mastodon.bsd.cafe/tags/http" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>http</span></a> <a href="https://mastodon.bsd.cafe/tags/authentication" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>authentication</span></a> <a href="https://mastodon.bsd.cafe/tags/daemon" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>daemon</span></a> to work with <a href="https://mastodon.bsd.cafe/tags/nginx" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nginx</span></a>' "authentication request" facility ... first step done! 🥳</p><p>Now I have a subset of HTTP 1.x implemented in <a href="https://mastodon.bsd.cafe/tags/C" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>C</span></a>, together with a dummy handler showing nothing but a static hello-world root document.</p><p>I know it's kind of stubborn doing that in C, but hey, <a href="https://mastodon.bsd.cafe/tags/coding" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>coding</span></a> it is great fun 🙈 </p><p><a href="https://github.com/Zirias/swad" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/Zirias/swad</span><span class="invisible"></span></a></p>
Matthias Andrasch<p>Motivated by Samuel Reichör, I took another try for Craft CMS + Coolify. But I can't get the nginx conf quite right 🤔 Thx for any hints! 👋 </p><p>Source code Docker Compose:<br>- <a href="https://github.com/mandrasch/ddev-craftcms-vite/blob/coolify-test/docker-compose.yml" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/mandrasch/ddev-craf</span><span class="invisible">tcms-vite/blob/coolify-test/docker-compose.yml</span></a><br>- <a href="https://github.com/mandrasch/ddev-craftcms-vite/blob/coolify-test/Dockerfile" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/mandrasch/ddev-craf</span><span class="invisible">tcms-vite/blob/coolify-test/Dockerfile</span></a><br>- <a href="https://github.com/mandrasch/ddev-craftcms-vite/blob/coolify-test/nginx.conf" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/mandrasch/ddev-craf</span><span class="invisible">tcms-vite/blob/coolify-test/nginx.conf</span></a></p><p>Coolify Discord question: <a href="https://discord.com/channels/459365938081431553/1355504172920864911" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">discord.com/channels/459365938</span><span class="invisible">081431553/1355504172920864911</span></a></p><p><a href="https://social.tchncs.de/tags/coolify" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>coolify</span></a> <a href="https://social.tchncs.de/tags/craftcms" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>craftcms</span></a> <a href="https://social.tchncs.de/tags/nginx" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nginx</span></a> <a href="https://social.tchncs.de/tags/serversideup" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>serversideup</span></a> <a href="https://social.tchncs.de/tags/dockercompose" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dockercompose</span></a> <a href="https://social.tchncs.de/tags/docker" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>docker</span></a></p>