Hacker Newsnew | past | comments | ask | show | jobs | submit | dekobon's commentslogin

I did a google search for the desync problem and found this page: https://my.f5.com/manage/s/article/K30341203

This type of thing is out of my realm of expertise. What information would you want to see about the problem? What would be helpful?


A simple statement by the maintainers of nginx stating how to configure so that a desync attack fails. That would have been helpful. Especially since the people behind the desync attack claim nginx is not invulnerable.

I've got no idea who F5 is. They seem legit, but that page didn't show up in my DDG search. But it's too late now. Water under the bridge.


Isn't the good part of the core team part of EnterpriseDB?


You can see a break-down of the core team and major contributors here, as well as their current company affiliation: https://www.postgresql.org/community/contributors/

(and as noted in the other comment, whilst EDB certainly makes important contributions, they are one of many)


TIL Julian Assange was a contributor to PostgreSQL


3 of 7 work at EDB, and the core team doesn’t drive the project roadmap. And EDB hackers fail to get patches in all the time, just like everyone else :)


It isn't documented, but if I recall correctly UNIT supports JSON with comments.


Regarding #1, NGINX has created a project to make ACME integration easier. It is quite new, so I doubt it will replace your use of Caddy, but it is worth consideration.

https://github.com/nginx/njs-acme


Proxy WASM appears to be supported thanks to a project from Kong: https://github.com/Kong/ngx_wasm_module

I haven't tried it yet, but it looks promising.



Data from these numbers is protected by HIPAA and callers can voluntarily be anonymous.


Don't be so sure about that:

https://www.forbes.com/sites/alexandralevine/2022/02/24/suic...

You can't anonymize your phone number which is all a data broker needs to connect to your identity.


Callers need to exercise a fairly high level OPSEC to maintain anonymity. If you aren’t using some VOIP service, there’s a good chance your call will be traced and the cops will be at your door anyway.


Disclaimer: I am one of the authors of the project.

I do wish that NGINX made LetsEncrypt as easy as to use as Caddy does. We are all big fans of LetsEncrypt and are quite happy to see NGINX donating to the project.

In this project (MARA), LetsEncrypt support is integrated via [Cert Manager](https://cert-manager.io/) for Kubernetes. This is nice because it supports certs from a variety of issuers like AWS, Google, Vault, Cloudflare, etc in addition to Let's Encrypt.


Prosper comes to mind: https://www.mayerbrown.com/en/perspectives-events/publicatio...

They didn't fall apart but got fined.


Author of the article and project here...

SeaweedFS and this project have different purposes. This project is intended to show off how to configure NGINX to act as a S3 proxying gateway by using [njs](https://nginx.org/en/docs/njs/). If you look at the github for it, you will see it is just a collection of nginx config and javascript files. This all works will standard open source NGINX. All it does is proxy files like a L7 load balancer, but in this case, it adds AWS v2/v4 headers to the upstream requests.

As for caching, that is totally configurable to whatever you want; the example configuration is set to 1 hour but that is arbitrary. In fact, one of the interesting this is all of the additional functionality that can be enabled because the proxying is being done by NGINX.

Regarding read and write, that can be enabled for AWSv2 signatures, but it is more difficult to do in AWSv4 signatures. I have an idea about how to accomplish it with v4 signatures, but it will take some time to prototype it.

What is "asynchronous write back"?


SeaweedFS is very different from Nginx. It's just the names are so similar.

There are 2 ways to cache: write through and write back. You are using write through, which needs to write to the remote storage before returning. Write back is only writing to local copy, which is much faster to return. The actual updates are executed asynchronously.


For requests with non-empty body with v4 signatures (e.g. PUT object) you can use Unsigned-Payload (https://docs.aws.amazon.com/AmazonS3/latest/API/sig-v4-heade...) and not have to compute the payload sha256.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: