From mboxrd@z Thu Jan 1 00:00:00 1970 X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on inbox.vuxu.org X-Spam-Level: X-Spam-Status: No, score=0.2 required=5.0 tests=DKIM_INVALID,DKIM_SIGNED, T_SCC_BODY_TEXT_LINE,UNPARSEABLE_RELAY autolearn=no autolearn_force=no version=3.4.4 Received: (qmail 28234 invoked from network); 31 Mar 2022 20:31:02 -0000 Received: from 4ess.inri.net (216.126.196.42) by inbox.vuxu.org with ESMTPUTF8; 31 Mar 2022 20:31:02 -0000 Received: from wopr.sciops.net ([216.126.196.60]) by 4ess; Thu Mar 31 16:17:54 -0400 2022 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sciops.net; s=20210706; t=1648757868; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=LrZfgXTa1nPJQvWIsNdoiblnLekjjiPiPmyjdH0vLzk=; b=uCt2OYWkBQihrZT7rlEZ//G779u313IJI8Axt7QZme7ap/oob9tTt+xHVonYaIj37QyNo2 GzXkZY7ZGK+wIgxl0Sv/zygTwhkjcnAeTagnKY+3y3LIwhyAeFPim5lJ3+WW+EdgIRnKi+ DX6XYCQzLQRpBrAaMqUPPUg527ucaq8= Received: from localhost (wopr.sciops.net [local]) by wopr.sciops.net (OpenSMTPD) with ESMTPA id 5115ff65 for <9front@9front.org>; Thu, 31 Mar 2022 13:17:48 -0700 (PDT) Date: Thu, 31 Mar 2022 13:17:48 -0700 From: Kurt H Maier To: 9front@9front.org Message-ID: Mail-Followup-To: 9front@9front.org References: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: List-ID: <9front.9front.org> List-Help: X-Glyph: ➈ X-Bullshit: HTTP over XMPP storage engine Subject: Re: [9front] 4chan hacked rc-httpd Reply-To: 9front@9front.org Precedence: bulk On Thu, Mar 31, 2022 at 07:35:37PM +0000, sirjofri wrote: > Hey, > > doesn't rc-httpd bind /usr/web / like tcp80 and httpd does? At least, it > could mkdir /usr/web/bin && bind /bin /usr/web/bin and then bind /usr/web > /. > > At least that's what I'd do. > > I tested on my web server which runs tcp80 and I didn't have an issue > like that. > > sirjofri Patches welcome -- currently we're just kicking out errors for requests with this crap in the url. khm