FreshPorts -- The Place For Ports If you buy from Amazon USA, please support us by using this link.
Follow us
Blog
Twitter

I am looking for an LTO tape library. Do you have one to spare?
Port details
nginx 1.6.2,2 www on this many watch lists=69 search for ports that depend on this port An older version of this port was marked as vulnerable.
Robust and small WWW server
Maintained by: osa@FreeBSD.org search for ports maintained by this maintainer
Port Added: 21 Oct 2004 18:03:06
Also Listed In: ipv6
License: BSD


NGINX is a high performance edge web server with the lowest memory footprint
and the key features to build modern and efficient web infrastructure.

NGINX functionality includes HTTP server, HTTP and mail reverse proxy, caching,
load balancing, compression, request throttling, connection multiplexing and
reuse, SSL offload and HTTP media streaming.

WWW: http://nginx.org/
WWW: http://nginx.com/
SVNWeb : Main Web Site : Distfiles Availability : PortsMon

NOTE: FreshPorts displays only information on required and default dependencies. Optional dependencies are not covered.

Required To Build:
  1. security/openssl
Required To Run:
  1. security/openssl
Required Libraries:
  1. devel/pcre

This port is required by:

for Build for Run * - deleted ports are only shown under the This port is required by section. It was harder to do for the Required section. Perhaps later...

To install the port: cd /usr/ports/www/nginx/ && make install clean
To add the package: pkg install www/nginx


Configuration Options
===> The following configuration options are available for nginx-1.6.2,2:
     DEBUG=off: Build with debugging support
     DEBUGLOG=off: Enable debug log (--with-debug)
     FILE_AIO=off: Enable file aio
     IPV6=on: IPv6 protocol support
     GOOGLE_PERFTOOLS=off: Enable google perftools module
     HTTP=on: Enable HTTP module
     HTTP_ADDITION=off: Enable http_addition module
     HTTP_CACHE=on: Enable http_cache module
     HTTP_DAV=off: Enable http_webdav module
     HTTP_FLV=off: Enable http_flv module
     HTTP_GEOIP=off: Enable http_geoip module
     HTTP_GZIP_STATIC=off: Enable http_gzip_static module
     HTTP_GUNZIP_FILTER=off: Enable http_gunzip_filter module
     HTTP_IMAGE_FILTER=off: Enable http_image_filter module
     HTTP_PERL=off: Enable http_perl module
     HTTP_RANDOM_INDEX=off: Enable http_random_index module
     HTTP_REALIP=off: Enable http_realip module
     HTTP_REWRITE=on: Enable http_rewrite module
     HTTP_SECURE_LINK=off: Enable http_secure_link module
     HTTP_SSL=on: Enable http_ssl module
     HTTP_STATUS=on: Enable http_stub_status module
     HTTP_SUB=off: Enable http_sub module
     HTTP_XSLT=off: Enable http_xslt module
     MAIL=off: Enable IMAP4/POP3/SMTP proxy module
     MAIL_IMAP=off: Enable IMAP4 proxy module
     MAIL_POP3=off: Enable POP3 proxy module
     MAIL_SMTP=off: Enable SMTP proxy module
     MAIL_SSL=off: Enable mail_ssl module
     SPDY=off: Enable SPDY protocol support (SSL req.)
     WWW=on: Enable html sample files
     CACHE_PURGE=off: 3rd party cache_purge module
     CTPP2=off: 3rd party CT++ module
     ECHO=off: 3rd party echo module
     HEADERS_MORE=off: 3rd party headers_more module
     HTTP_ACCEPT_LANGUAGE=off: 3rd party accept_language module
     HTTP_ACCESSKEY=off: 3rd party http_accesskey module
     HTTP_AUTH_DIGEST=off: 3rd party http_authdigest module
     HTTP_AUTH_LDAP=off: 3rd party http_auth_ldap module
     HTTP_AUTH_PAM=off: 3rd party http_auth_pam module
     HTTP_AUTH_REQ=off: 3rd party http_auth_request module
     HTTP_DAV_EXT=off: 3rd party webdav_ext module
     HTTP_EVAL=off: 3rd party eval module
     HTTP_FANCYINDEX=off: 3rd party http_fancyindex module
     HTTP_FOOTER=off: 3rd party http_footer module
     HTTP_MOGILEFS=off: 3rd party mogilefs module
     HTTP_NOTICE=off: 3rd party notice module
     HTTP_PUSH=off: 3rd party push module
     HTTP_PUSH_STREAM=off: 3rd party push stream module
     HTTP_REDIS=off: 3rd party http_redis module
     HTTP_RESPONSE=off: 3rd party http_response module
     HTTP_SUBS_FILTER=off: 3rd party subs filter module
     HTTP_UPLOAD=off: 3rd party upload module
     HTTP_UPLOAD_PROGRESS=off: 3rd party uploadprogress module
     HTTP_UPSTREAM_FAIR=off: 3rd party upstream fair module
     HTTP_UPSTREAM_HASH=off: 3rd party upstream hash module
     HTTP_UPSTREAM_STICKY=off: 3rd party upstream sticky module
     HTTP_ZIP=off: 3rd party http_zip module
     ARRAYVAR=off: 3rd party array_var module
     DRIZZLE=off: 3rd party drizzlie module
     ENCRYPTSESSION=off: 3rd party encrypted_session module
     FORMINPUT=off: 3rd party form_input module
     GRIDFS=off: 3rd party gridfs module
     ICONV=off: 3rd party iconv module
     LET=off: 3rd party let module
     LUA=off: 3rd party lua module
     MEMC=off: 3rd party memc (memcached) module
     MODSECURITY=off: 3rd party mod_security module
     NAXSI=off: 3rd party naxsi module
     PASSENGER=off: 3rd party passenger module
     POSTGRES=off: 3rd party postgresql module
     RDS_CSV=off: 3rd party rds_csv module
     RDS_JSON=off: 3rd party rds_json module
     REDIS2=off: 3rd party redis2 module
     RTMP=off: 3rd party rtmp module
     SET_MISC=off: 3rd party set_misc module
     SFLOW=off: 3rd party sflow module
     SLOWFS_CACHE=off: 3rd party slowfs_cache module
     SRCACHE=off: 3rd party srcache module
     SUPERVISORD=off: 3rd party supervisord module
     SYSLOG_SUPPORT=off: 3rd party syslog support
     TCP_PROXY=off: 3rd party tcp_proxy module
     UDPLOG=off: 3rd party udplog (syslog) module
     XRID_HEADER=off: 3rd party x-rid header module
     XSS=off: 3rd party xss module
     VIDEO=off: Video module support
====> Video module support: you can only select none or one of them
     HTTP_MP4=off: Enable http_mp4 module
     HTTP_MP4_H264=off: 3rd party mp4/h264 module
===> Use 'make config' to modify these settings

Master Sites:
  1. http://distcache.FreeBSD.org/local-distfiles/osa/
  2. http://distcache.FreeBSD.org/ports-distfiles/
  3. http://distcache.eu.FreeBSD.org/local-distfiles/osa/
  4. http://distcache.us-east.FreeBSD.org/local-distfiles/osa/
  5. http://distcache.us-west.FreeBSD.org/local-distfiles/osa/
  6. http://nginx.org/download/
Notes from UPDATING
These upgrade notes are taken from /usr/ports/UPDATING
  • 2008-05-19
    Affects: users of www/nginx and www/nginx-devel
    Author: osa@FreeBSD.org
    Reason: 
      Nginx version lines have been changed: 0.5 -> 0.6 for stable and
      0.6 -> 0.7 for development version.  Make sure your configuration
      files are compatible with the new version(s).
    
    

Number of commits found: 494 (showing only 100 on this page)

«  1 | 2 | 3 | 4 | 5  »  

Commit History - (may be incomplete: see SVNWeb link above for full details)
DateByDescription
01 Nov 2011 19:36:11
Original commit files touched by this commit  1.0.9,1
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 1.0.8 to 1.0.9.

<ChangeLog>

*) Change: now the 0x7F-0x1F characters are escaped as \xXX in an
   access_log.

*) Change: now SIGWINCH signal works only in daemon mode.

*) Feature: "proxy/fastcgi/scgi/uwsgi_ignore_headers" directives support
   the following additional values: X-Accel-Limit-Rate,
   X-Accel-Buffering, X-Accel-Charset.

*) Feature: decrease of memory consumption if SSL is used.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
10 Oct 2011 13:19:04
Original commit files touched by this commit  1.0.8,1
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party cache_purge module from 1.3 to 1.4.

Do not bump PORTREVISION.

<ChangeLog>

* Add AIO support.
  Requested by Emin Hasanov.

</ChangeLog>
01 Oct 2011 07:33:44
Original commit files touched by this commit  1.0.8,1
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 1.0.7 to 1.0.8.

<ChangeLog>

*) Bugfix: nginx could not be built --with-http_mp4_module and without
   --with-debug option.

</ChangeLog>
30 Sep 2011 16:49:30
Original commit files touched by this commit  1.0.7,1
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 1.0.6 to 1.0.7.

Original http_mp4 and third-party http_mp4_h268 modules are
incompatible, add note about.

<ChangeLog>

*) Change: now if total size of all ranges is greater than source
   response size, then nginx disables ranges and returns just the source
   response.

*) Feature: the "max_ranges" directive.

*) Feature: the module ngx_http_mp4_module.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
28 Sep 2011 17:21:23
Original commit files touched by this commit  1.0.6_1,1
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party http_redis module from 0.3.4 to 0.3.5.
Update third-party http_gunzip_filter module from 0.3 to 0.4.

Do not bump PORTREVISION because these third-party modules are
disabled by default.

<ChangeLog>

Changes with http_redis 0.3.5

*) Feature: add test for not set $redis_db directive.

*) Feature: keep-alive support merged from original
   memcached module 1.1.4.

Changes with http_gunzip 0.4

*) Feature: support for nginx 1.1.4.

</ChangeLog>
06 Sep 2011 23:40:32
Original commit files touched by this commit  1.0.6_1,1
 This port version is marked as vulnerable.
pawel search for other commits by this committer
- Chase devel/google-perftools shlib bump
- security/tor*: add -L${LOCALBASE}/lib to LDFLAGS (fixes linking)

Approved by:    miwi, wen (mentors implicit)
05 Sep 2011 08:40:26
Original commit files touched by this commit  1.0.6,1
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 3.0.8 to 3.0.9:

o) www/rubygem-passenger; [1]
o) passenger support for www/nginx and www/nginx-devel;

Remove needless patch.

Do not bump PORTREVISION because passenger third-party module
disabled by default.

Approved by:    maintainer [1]
02 Sep 2011 09:32:03
Original commit files touched by this commit  1.0.6,1
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party lua module from 0.2 to 0.3.

Bump PORTREVISION is unnecessary, because the module is
disabled by default.
29 Aug 2011 15:53:39
Original commit files touched by this commit  1.0.6,1
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 1.0.5 to 1.0.6.

<ChangeLog>

*) Feature: cache loader run time decrease.

*) Feature: loading time decrease of configuration with large number of
   HTTPS sites.

*) Feature: now nginx supports ECDHE key exchange ciphers.
   Thanks to Adrian Kotelba.

*) Feature: the "lingering_close" directive.

*) Feature: now shared zones and caches use POSIX semaphores on Solaris.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
24 Aug 2011 16:56:00
Original commit files touched by this commit  1.0.5,1
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party module ngx_http_redis from 0.3.3 to 0.3.4.

<ChangeLog>

*) Change: better error messages diagnostics in select phase.

*) Add more comments in source code.

*) Bugfix: fix interaction with redis if redis_db was unused.
   Found by Sergey Makarov.
   Thanks to Igor Sysoev.

*) Feature: add test suite for redis backend.
   Thanks to Maxim Dounin.

</ChangeLog>

Do not bump PORTREVISION.
12 Aug 2011 16:13:46
Original commit files touched by this commit  1.0.5,1
 This port version is marked as vulnerable.
osa search for other commits by this committer
Downgrade from latest development version 1.1.0 to latest
stable version 1.0.5.

Bump PORTEPOCH.
10 Aug 2011 16:22:58
Original commit files touched by this commit  1.1.0
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 3.0.7 to 3.0.8:

1) www/rubygem-passenger;

2) passenger support for www/nginx and www/nginx-devel;

Also add patch for fix NULL pointer crash that occurs when
HTTP 1.0 Host header isn't given, obtained from passenger's
upstream.

Approved by:    maintainer [1]
04 Aug 2011 07:51:26
Original commit files touched by this commit  1.1.0
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 1.0.5 to 1.1.0.

<ChangeLog>

*) Feature: cache loader run time decrease.

*) Feature: "loader_files", "loader_sleep", and "loader_threshold"
   options of the "proxy/fastcgi/scgi/uwsgi_cache_path" directives.

*) Feature: loading time decrease of configuration with large number of
   HTTPS sites.

*) Feature: now nginx supports ECDHE key exchange ciphers.
   Thanks to Adrian Kotelba.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
22 Jul 2011 07:14:13
Original commit files touched by this commit  1.0.5
 This port version is marked as vulnerable.
osa search for other commits by this committer
Add one more third-party module nginx-gridfs 0.8 - module to serve content
directly from MongoDB's GridFS.

Update nginx_redis2 module from 0.7rc5 to 0.7.

Fix compile mod_zip module.

Move down CHUNKIN_MODULE in OPTIONS.

Bump PORTREVISION is unnecessary, because these modules are
disabled by default.
20 Jul 2011 10:50:51
Original commit files touched by this commit  1.0.5
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 1.0.4 to 1.0.5.

Fix third-party accept_language fetch by moving to github.

<ChangeLog>

*) Change: now default SSL ciphers are "HIGH:!aNULL:!MD5".
   Thanks to Rob Stradling.

*) Feature: the "referer_hash_max_size" and "referer_hash_bucket_size"
   directives.
   Thanks to Witold Filipczyk.

*) Feature: $uid_reset variable.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
13 Jul 2011 09:21:18
Original commit files touched by this commit  1.0.4
 This port version is marked as vulnerable.
osa search for other commits by this committer
Add two more third-party modules:

o) chunkin-nginx-module - HTTP 1.1 chunked-encoding request body support;
o) xss-nginx-module - native cross-site scripting support in nginx.

Update nginx_eval_module to the latest version 1.0.3, move MASTER_SITES
to github.

Bump PORTREVISION is unnecessary, because these modules are
disabled by default.
12 Jul 2011 15:46:56
Original commit files touched by this commit  1.0.4
 This port version is marked as vulnerable.
osa search for other commits by this committer
Add one more third-party module:

o) ngx_postgres-0.8 - upstream module that allows nginx to
   communicate directly with PostgreSQL database.

Bump PORTREVISION is unnecessary, because these modules are
disabled by default.
12 Jul 2011 12:18:22
Original commit files touched by this commit  1.0.4
 This port version is marked as vulnerable.
osa search for other commits by this committer
Add 3 third-party modules:

o) ngx_devel_kit - module that is designed to extend the core
   functionality of nginx;
o) ngx_lua - embed the power of lua into nginx;
o) ngx_redis2 - upstream module for the Redis database 2.0 protocol.

Bump PORTREVISION is unnecessary, because these modules are
disabled by default.
12 Jul 2011 09:41:28
Original commit files touched by this commit  1.0.4
 This port version is marked as vulnerable.
osa search for other commits by this committer
Add third-party module srcache-0.12.

Use more or less canonical name for github.com MASTER_SITES.
Fix fetch for third-party module memc.

Bump PORTREVISION is unnecessary, because these modules are
disabled by default.
11 Jul 2011 11:22:01
Original commit files touched by this commit  1.0.4
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party modules:

o) echo from 0.34 to 0.36;
o) headers_more from 0.14 to 0.15;
o) memc from 0.11 to 0.12.

Change default MASTER_SITES for these modules from MASTER_SITE_LOCAL
to http://download.github.com/.

Fix whitespaces.

Bump PORTREVISION is unnecessary, because these modules are
disabled by default.
08 Jun 2011 07:07:43
Original commit files touched by this commit  1.0.4
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update third party nginx_substitutions_filter from 0.5.2 revision 44 to
0.5.2 revision 45.

Do not bump PORTREVISION.
08 Jun 2011 06:56:25
Original commit files touched by this commit  1.0.4
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update third party ngx_http_redis module from 0.3.2 to 0.3.3.

Do not bump PORTREVISION.

<ChangeLog>

*) Bugfix: fix interaction with redis if redis_db was used.
   Also, compile with -Werror now is possible.

</ChangeLog>
01 Jun 2011 12:06:12
Original commit files touched by this commit  1.0.4
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 1.0.3 to 1.0.4.

<ChangeLog>

*) Change: now regular expressions case sensitivity in the "map"
   directive is given by prefixes "~" or "~*".

*) Feature: now shared zones and caches use POSIX semaphores on Linux.
   Thanks to Denis F. Latypoff.

*) Bugfix: "stalled" cache updating" alert.

*) Bugfix: nginx could not be built --without-http_auth_basic_module;
   the bug had appeared in 1.0.3.

</ChangeLog>
26 May 2011 12:49:30
Original commit files touched by this commit  1.0.3
 This port version is marked as vulnerable.
osa search for other commits by this committer
Add vendor patch for fix build with

% configure ...  --without-http_auth_basic_module ...

Bump PORTREVISION is unnecessary, because http_auth_basic module is
enabled by default.
25 May 2011 16:20:25
Original commit files touched by this commit  1.0.3
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 1.0.2 to 1.0.3.

<ChangeLog>

*) Feature: the "auth_basic_user_file" directive supports "$apr1",
   "{PLAIN}", and "{SSHA}" password encryption methods.
   Thanks to Maxim Dounin.

*) Feature: the "geoip_org" directive and $geoip_org variable.
   Thanks to Alexander Uskov, Arnaud Granal, and Denis F. Latypoff.

*) Feature: ngx_http_geo_module and ngx_http_geoip_module support IPv4
   addresses mapped to IPv6 addresses.

*) Bugfix: a segmentation fault occurred in a worker process during
   testing IPv4 address mapped to IPv6 address, if access or deny rules
   were defined only for IPv6; the bug had appeared in 0.8.22.

*) Bugfix: a cached reponse may be broken if proxy/fastcgi/scgi/
   uwsgi_cache_bypass and proxy/fastcgi/scgi/uwsgi_no_cache directive
   values were different; the bug had appeared in 0.8.46.

</ChangeLog>
10 May 2011 13:48:04
Original commit files touched by this commit  1.0.2
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 1.0.1 to 1.0.2.

<ChangeLog>

*) Feature: now shared zones and caches use POSIX semaphores.

*) Bugfix: in the "rotate" parameter of the "image_filter" directive.
   Thanks to Adam Bocim.

*) Bugfix: nginx could not be built on Solaris; the bug had appeared in
   1.0.1.

</ChangeLog>
03 May 2011 19:54:32
Original commit files touched by this commit  1.0.1
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 1.0.0 to 1.0.1.
Update CONFLICTS.

Also update third party modules:
o) ngx_cache_purge from 1.2 to 1.3;
o) ngx_slowfs_cache from 1.5 to 1.6.

<ChangeLog>

*) Change: now the "split_clients" directive uses MurmurHash2 algorithm
   because of better distribution.
   Thanks to Oleg Mamontov.

*) Change: now long strings starting with zero are not considered as
   false values.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
19 Apr 2011 12:47:23
Original commit files touched by this commit  1.0.0
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update third party upstream keepalive module from 0.3 to 0.4.

Do not bump PORTREVISION.

<ChangeLog>

*) Bugfix: the "[alert] ... open socket ... left in connection ..."
   messages were logged on nginx worker process gracefull exit for
   each cached connection; the bug had appeared in 0.3.

</ChangeLog>
14 Apr 2011 11:31:29
Original commit files touched by this commit  1.0.0
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 3.0.6 to 3.0.7:

1) www/rubygem-passenger;

2) passenger support for www/nginx and www/nginx-devel;
   update passenger's version for patches.

3) for speed-up rails applications build passenger without
   debugging information by default.  Otherwise WITH_DEBUG
   required.

Approved by:    maintainer [1,3]
12 Apr 2011 10:20:31
Original commit files touched by this commit  1.0.0
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update to latest stable version 1.0.0.

For speed-up rails applications don't build debugging information for
passenger module by default.  Otherwise WITH_DEBUG required.

Remove needless nginx.8 for www/nginx, now its in the distro.

<ChangeLog>

*) Bugfix: a cache manager might hog CPU after reload.
   Thanks to Maxim Dounin.

*) Bugfix: an "image_filter crop" directive worked incorrectly coupled
   with an "image_filter rotate 180" directive.

*) Bugfix: a "satisfy any" directive disabled custom 401 error page.

</ChangeLog>
04 Apr 2011 18:33:35
Original commit files touched by this commit  0.8.54_2
 This port version is marked as vulnerable.
osa search for other commits by this committer
Add third-party http_subs_filter module.
Do not bump PORTREVISION.

PR:     156163
04 Apr 2011 10:41:52
Original commit files touched by this commit  0.8.54_2
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party fancyindex module from 0.3 to 0.3.1.

Do not bump PORTREVISIONs.
04 Apr 2011 07:59:12
Original commit files touched by this commit  0.8.54_2
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 3.0.5 to 3.0.6:

o) www/rubygem-passenger; [*]
o) passenger support for www/nginx and www/nginx-devel.

More accurate for detect dependence of nginx ports. [*]

Approved by:    maintainer [*]
15 Mar 2011 17:03:11
Original commit files touched by this commit  0.8.54_2
 This port version is marked as vulnerable.
osa search for other commits by this committer
Switch IPv6 support on by default.

Bump PORTREVISIONs.

Spotted by:     tom
11 Mar 2011 14:37:59
Original commit files touched by this commit  0.8.54_1
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 3.0.4 to 3.0.5:

o) www/rubygem-passenger; (1)
o) passenger support for www/nginx and www/nginx-devel. (2)

Adopt passenger's version update for extra patches.

Update preferred nginx version (1).
Do not bump PORTREVISIONs. (2)

Approved by:    Jacob Atzen <jatzen@gmail.com> (maintainer) (1)
02 Mar 2011 19:13:55
Original commit files touched by this commit  0.8.54_1
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 3.0.3 to 3.0.4:

o) www/rubygem-passenger; (1)
o) passenger support for www/nginx and www/nginx-devel. (2)

Adopt passenger's version update for extra patches.

Do not bump PORTREVISIONs. (2)

Approved by:    Jacob Atzen <jatzen@gmail.com> (maintainer) (1)
27 Feb 2011 13:01:19
Original commit files touched by this commit  0.8.54_1
 This port version is marked as vulnerable.
miwi search for other commits by this committer
- Chase devel/google-perftools shlib bump
25 Feb 2011 11:07:45
Original commit files touched by this commit  0.8.54
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 3.0.2 to 3.0.3:

o) www/rubygem-passenger; (1)
o) passenger support for www/nginx and www/nginx-devel. (2)

Adopt passenger's version update for extra patches.

Do not bump PORTREVISIONs. (2)

Approved by:    Jacob Atzen <jatzen@gmail.com> (maintainer) (1)
01 Feb 2011 10:47:21
Original commit files touched by this commit  0.8.54
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party headers_more module from 0.13 to 0.14.

Do not bump PORTREVISIONs.

Feature safe:   yes
20 Dec 2010 04:15:22
Original commit files touched by this commit  0.8.54
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party headers_more module from 0.10 to 0.13.

Do not bump PORTREVISIONs.
17 Dec 2010 21:57:02
Original commit files touched by this commit  0.8.54
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party modules:

o) uploadprogress from 0.8 to 0.8.2;
o) echo from 0.30 to 0.34;

Do not bump PORTREVISIONs.
17 Dec 2010 14:49:01
Original commit files touched by this commit  0.8.54
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 3.0.1 to 3.0.2:

o) www/rubygem-passenger; [*]
o) passenger support for www/nginx and www/nginx-devel.

Remove needless extra patches.

Approved by:    maintainer [*]
14 Dec 2010 12:04:11
Original commit files touched by this commit  0.8.54
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.53 to 0.8.54.

<ChangeLog>

*) Bugfix: if there was a single server for given IPv6 address:port
   pair, then captures in regular expressions in a "server_name"
   directive did not work.

*) Bugfix: a segmentation fault might occur in a worker process, if the
   "auth_basic" directive was used.
   Thanks to Michail Laletin.

*) Bugfix: compatibility with ngx_http_eval_module; the bug had
   appeared in 0.8.42.

</ChangeLog>
12 Dec 2010 13:20:06
Original commit files touched by this commit  0.8.53_1
 This port version is marked as vulnerable.
osa search for other commits by this committer
Add third-party syslog support, original patch obtained from
http://dl.dropbox.com/u/5836407/Patches/Nginx_0.8.49-syslog-support.txt.

Do not bump PORTREVISIONs.

Submitted by:   Anes Muhametov aka anes at anes dot su
PR:             ports/152920
12 Dec 2010 12:22:47
Original commit files touched by this commit  0.8.53_1
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update passenger as well as support for passenger-specific ports
from 3.0.0 to 3.0.1.

Also:

 o) respect CC/CXX/CFLAGS/PTHREAD_LIBS flags;
 o) build depends against devel/libev instead of internal libev;
 o) change depends from curl binary to libcurl;
 o) revert back GEM_LIB_DIR for pkg-message.    (!)

Do not bump PORTREVISIONs for www/nginx and www/nginx-devel ports.

<Note>

Patch extra-patch-passenger::ext::common::Utils.cpp obtained from
passenger's git:
https://github.com/FooBarWidget/passenger/commit/9a811060db56cfad2e2056d90cac1a354870dbad
and should be remove in next [3.0.2] port update.

</Note>

Approved by:    maintainer [*]
Pointy hat to:  wen (!)
06 Dec 2010 06:28:05
Original commit files touched by this commit  0.8.53_1
 This port version is marked as vulnerable.
osa search for other commits by this committer
Speed up build passenger(tm) support by accurate corresponding patch.

Do not bump PORTREVISIONs.
01 Dec 2010 20:18:57
Original commit files touched by this commit  0.8.53_1
 This port version is marked as vulnerable.
osa search for other commits by this committer
Add support for passenger 3.0.0.

<Note>

www/nginx and www/nginx-devel build support for nginx only.
For full support www/rubygem-passenger port compiled with
option WITH_NGINXPORT should be installed.

</Note>

Do not bump PORTREVISIONs.
23 Nov 2010 12:39:09
Original commit files touched by this commit  0.8.53_1
 This port version is marked as vulnerable.
osa search for other commits by this committer
Add nginx(8).
Bump PORTREVISION.

Thanks to:
o) Maxim Dounin aka mdounin at mdounin dot ru
o) Ruslan Ermilov aka ru@

Spotted by:     Sergey Svishchev aka svs at ropnet dot ru
PR:             ports/152212
16 Nov 2010 19:32:10
Original commit files touched by this commit  0.8.53
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly (www/nginx and www/nginx-devel):
*) update third-party http_auth_pam module from 1.1 to 1.2.
*) remove MD5.

Do not bump PORTREVISIONs.
28 Oct 2010 09:45:31
Original commit files touched by this commit  0.8.53
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly (www/nginx and www/nginx-devel):

*) update third party memc module from 0.08 to 0.11;
*) remove third party passenger module, since it possible to run as
   standalone server.
18 Oct 2010 12:58:15
Original commit files touched by this commit  0.8.53
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.52 to 0.8.53.
Update third-party fancyindex module from 0.2.5 to 0.3.

<ChangeLog>

*) Feature: now the "error_page" directive allows to change a status
   code in a redirect.

*) Feature: the "gzip_disable" directive supports special "degradation"
   mask.

*) Bugfix: a socket leak might occurred if file AIO was used.
   Thanks to Maxim Dounin.

*) Bugfix: if the first server had no "listen" directive and there was
   no explicit default server, then a next server with a "listen"
   directive became the default server; the bug had appeared in 0.8.21.

</ChangeLog>
28 Sep 2010 07:27:09
Original commit files touched by this commit  0.8.52
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.8.51 to 0.8.52.

<ChangeLog>

*) Bugfix: nginx used SSL mode for a listen socket if any listen option
   was set; the bug had appeared in 0.8.51.

</ChangeLog>
28 Sep 2010 06:32:17
Original commit files touched by this commit  0.8.51
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.7.67 to latest stable version 0.8.51 by merge changes from
www/nginx-devel.

Update CONFLIGS and temporary mark IGNORE www/nginx-devel, because latest
version available from www/nginx.

<Announcement>

Now the 0.8.x branch becomes a stable branch.  The new features have been
appeared during 0.8 development:

o named regular expression captures;
o file AIO in FreeBSD and Linux;
o SSL CRL;
o SCGI and uwsgi modules.

</Announcement>
28 Sep 2010 04:00:32
Original commit files touched by this commit  0.7.67_1
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update third party upload module from 2.0.12 to 2.2.0.
Do not bump PORTREVISIONs.

<ChangeLog>

*) Added feature: resumable uploads.
*) Added feature: allow to use of $variables in "upload_pass"
   directive (Piotr Sikora).
*) Added feature: allow module's directives inside if
   statements (David Backeus).
*) Added feature: directive upload_tame_arrays and ability to
   do some magic with php arrays.

</ChangeLog>
14 Sep 2010 18:57:55
Original commit files touched by this commit  0.7.67_1
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update third party upstream_keepalive from 0.2 to 0.3.
Do not bump PORTREVISIONs.

<ChangeLog>

*) Bugfix: cached connections might be closed needlessly.
   Thanks to Martin Fjordvald.

*) Bugfix: in memory allocation error handling on config creation.

</ChangeLog>

This commit is dedicate to my sister's birthday.
13 Sep 2010 17:10:35
Original commit files touched by this commit  0.7.67_1
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update third party mod_zip from 1.1.5 to 1.1.6.
Do not bump PORTREVISIONs.

<ChangeLog>

*) Feature: Support for UTF-8 filenames. Thanks to Robbie Scott/Bandcamp.

*) Feature: Issue subrequests serially. Thanks to Brian Moran/OneHub.

*) Feature: Use Zip64 when archive is larger than 4 GB. Thanks to Vasily
   Fedoseyev.

*) Bugfix: Support spaces in URLs.

</ChangeLog>
03 Sep 2010 13:28:39
Original commit files touched by this commit  0.7.67_1
 This port version is marked as vulnerable.
osa search for other commits by this committer
Install three plain configuration files with -dist prefix.
Do not remove fastcgi_params configuration file, which may carefully
edited by the user.

Sync DEBUG knob description with www/nginx-devel.

Bump PORTREVISION.
03 Sep 2010 03:59:27
Original commit files touched by this commit  0.7.67
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update third-party mogilefs module from 1.0.3 to 1.0.4.
Do not bump PORTREVISIONs.

<ChangeLog>

*) Added feature: multiple $mogilefs_path variables.

*) Fixed bug: segfault on reconfiguration due to uninitialized class
   template (thanks to Pyry Hakulinen).

</ChangeLog>
18 Aug 2010 09:37:34
Original commit files touched by this commit  0.7.67
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party ngx_http_redis module from 0.3.1 to 0.3.2.
Do not bump PORTREVISIONs.

<ChangeLog>

*) Bugfix: ngx_http_redis_module might issue the error message
   "redis sent invalid trailer".  For more information see:

*) Change: now the $redis_db set is not obligatory; default
   value is "0".

</ChangeLog>
12 Aug 2010 03:30:56
Original commit files touched by this commit  0.7.67
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update third-party ngx_cache_purge module from 1.1 to 1.2.
Do not bump PORTREVISIONs.

<ChangeLog>

* Fix various build scenarios with disabled upstream modules.
  Reported by Johan Bergstroem.

* Add ability to purge content from SCGI's cache.
  Requested by Johan Bergstroem.

</ChangeLog>
01 Jul 2010 15:22:20
Original commit files touched by this commit  0.7.67
 This port version is marked as vulnerable.
osa search for other commits by this committer
Convert post-patch target to EXTRA_PATCHES entries for patches for third-party
modules.
No functionally changes.
Do not bump PORTREVISIONs.

Spotted by:     Maxim Dounin aka mdounin at mdounin dot ru

Feature safe:   yes
30 Jun 2010 17:35:58
Original commit files touched by this commit  0.7.67
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update passenger from 2.2.14 to 2.2.15 for:

o) www/nginx and www/nginx-devel        [1]
o) www/rubygem-passenger                [2]

Remove needless patch.

[1] Do not bump PORTREVISION.
[2] Approved by:        Jacob Atzen aka jatzen at gmail dot com (maintainer)

Feature safe:           yes
24 Jun 2010 03:45:17
Original commit files touched by this commit  0.7.67
 This port version is marked as vulnerable.
osa search for other commits by this committer
Illuminate GeoIP module. [1]
Fix typo for thirdparty udp module. [2]
Do not bump PORTREVISION.

Feature safe: yes

Submitted by:   Rainer Duffner <rainer@ultra-secure.de> [1]
                Vadim Goncharov aka nuclight via IRC [2]

PR:             ports/148092 [1]
18 Jun 2010 06:55:17
Original commit files touched by this commit  0.7.67
 This port version is marked as vulnerable.
osa search for other commits by this committer
Change broken MASTER_SITES for third-party fancyindex module to
MASTER_SITE_LOCAL. (*)
Uniform fancyindex tarball for stable and devel version.
No functionaly changes.
Do not bump PORTREVISION.

(*) Notice from:        Rafal Szkodzinski aka uid at atnus dot com
15 Jun 2010 12:25:52
Original commit files touched by this commit  0.7.67
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.7.66 to 0.7.67.

<ChangeLog>

*) Security: nginx/Windows worker might be terminated abnormally if a
   requested file name has invalid UTF-8 encoding.

</ChangeLog>
10 Jun 2010 17:12:31
Original commit files touched by this commit  0.7.66
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update third-party fancyindex module from 0.2.2 to 0.2.5.
Remove needless patches.

Do not bump PORTREVISIONs.
08 Jun 2010 11:28:41
Original commit files touched by this commit  0.7.66
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update third-party slowfs_cache module from 1.4 to 1.5.
Remove needless patch.

Do not bump PORTREVISIONs.
08 Jun 2010 04:47:29
Original commit files touched by this commit  0.7.66
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update third-party cache_purge module from 1.0 to 1.1.

Do not bump PORTREVISIONs.
07 Jun 2010 14:32:02
Original commit files touched by this commit  0.7.66
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.7.65 to 0.7.66.
License.

<ChangeLog>

*) Security: now nginx/Windows ignores default file stream name.
   Thanks to Jose Antonio Vazquez Gonzalez.

*) Change: now the charset filter runs before the SSI filter.

*) Change: now no message is written in an error log if a variable is
   not found by $r->variable() method.

*) Change: now keepalive connections after POST requests are not
   disabled for MSIE 7.0+.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
07 Jun 2010 02:45:14
Original commit files touched by this commit  0.7.65
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update third-party headers_more module from 0.09 to 0.10.

Do not bump PORTREVISIONs.
06 Jun 2010 07:09:19
Original commit files touched by this commit  0.7.65
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 2.2.12 to 2.2.14:

1) third-party passenger module for www/nginx and www/nginx-devel
2) www/rubygem-passenger

Do not bump PORTREVISIONs. [1]

Approved by:    Jacob Atzen aka jatzen at gmail dot com [2]
02 Jun 2010 17:14:56
Original commit files touched by this commit  0.7.65
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update third-party headers_more module from 0.08 to 0.09.

Do not bump PORTREVISIONs.
01 Jun 2010 09:43:03
Original commit files touched by this commit  0.7.65
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update:

1) third-party passenger module from 2.2.11 to 2.2.12 for www/nginx
2) third-party passenger module from 2.2.11 to 2.2.12 for www/nginx-devel
3) www/rubygem-passenger from 2.2.11 to 2.2.12

Remove needless patch. [2]

Do not bump PORTREVISIONs.

Approved by:    Jacob Atzen aka jatzen at gmail dot com [3]
25 May 2010 16:10:57
Original commit files touched by this commit  0.7.65
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update third-party slowfs_cache module from 1.3 to 1.4.
Remove needless patch.

Do not bump PORTREVISIONs.
07 May 2010 03:56:19
Original commit files touched by this commit  0.7.65
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update third-party echo module from 0.28 to 0.30.

Do not bump PORTREVISIONs.
03 May 2010 13:58:42
Original commit files touched by this commit  0.7.65
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update third-party echo module from 0.27 to 0.28.

Do not bump PORTREVISIONs.
29 Apr 2010 04:18:25
Original commit files touched by this commit  0.7.65
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update third-party supervisord module from 1.3 to 1.4.

Do not bump PORTREVISIONs.
28 Apr 2010 19:18:28
Original commit files touched by this commit  0.7.65
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update third party headers_more module from 0.07 to 0.08.
23 Apr 2010 03:48:29
Original commit files touched by this commit  0.7.65
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update third party http_memc module from 0.06 to 0.08.

Do not bump PORTREVISION.
08 Apr 2010 11:08:05
Original commit files touched by this commit  0.7.65
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update third-party echo module from 0.26 to 0.27.
Remove needless extra patch.

Do not bump PORTREVISIONs.
28 Mar 2010 04:44:55
Original commit files touched by this commit  0.7.65
 This port version is marked as vulnerable.
dougb search for other commits by this committer
Cleanse uneeded RC_SUBR variables

Approved by:    pgolluci
27 Mar 2010 00:15:24
Original commit files touched by this commit  0.7.65
 This port version is marked as vulnerable.
dougb search for other commits by this committer
Begin the process of deprecating sysutils/rc_subr by
s#. %%RC_SUBR%%#. /etc/rc.subr#
25 Mar 2010 10:02:43
Original commit files touched by this commit  0.7.65
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly add third-party echo module version 0.26.

Do not bump PORTREVISIONs.
25 Mar 2010 02:37:06
Original commit files touched by this commit  0.7.65
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update third-party auth request module from 0.1 to 0.2.

Do not bump PORTREVISIONs.

<ChangeLog>

*) Feature: auth_request_set directive.

*) Bugfix: segmentation fault happened on auth request handled by
   proxy_pass or fastcgi_pass if initial request has non-empty body.

</ChangeLog>
23 Mar 2010 05:01:02
Original commit files touched by this commit  0.7.65
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update third-party gunzip filter module from 0.2 to 0.3.

Do not bump PORTREVISIONs.
10 Mar 2010 04:30:34
Original commit files touched by this commit  0.7.65
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update third-party fancyindex module from 0.2.1 to 0.2.2.

Do not bump PORTREVISIONs.

PR:     144557
09 Mar 2010 09:49:09
Original commit files touched by this commit  0.7.65
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update CATEGORIES if defined passenger module support.

Do not bump PORTREVISIONs.
05 Mar 2010 11:46:00
Original commit files touched by this commit  0.7.65
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update third party passenger module from 2.0.10 to 2.0.11.

Do not bump PORTREVISIONs.

Feature safe:   yes
02 Mar 2010 10:31:38
Original commit files touched by this commit  0.7.65
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update third party upload module from 2.0.11 to 2.0.12.
Remove needless patch for www/nginx-devel.

Do not bump PORTREVISIONs.

Feature safe:   yes
27 Feb 2010 19:56:07
Original commit files touched by this commit  0.7.65
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly add third party auth_request module, version 0.1.

Do not bump PORTREVISIONs.

Feature safe:   yes
27 Feb 2010 19:20:20
Original commit files touched by this commit  0.7.65
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly add third party headers_more module, version 0.07.

Do not bump PORTREVISIONs.

Feature safe:   yes
22 Feb 2010 17:29:33
Original commit files touched by this commit  0.7.65
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update third party modules:

o) http_push from 0.69 to 0.692;
o) passenger from 2.2.9 to 2.2.10.

Do not bump PORTREVISIONs.

Feature safe:   yes
22 Feb 2010 13:53:25
Original commit files touched by this commit  0.7.65
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update third party modules for www/nginx and www/nginx-devel:

o) h264_streaming from 2.2.5 to 2.2.7;
o) passenger from 2.2.8 to 2.2.9.

Do not bump PORTREVISIONs.

Feature safe:   yes
18 Feb 2010 19:16:13
Original commit files touched by this commit  0.7.65
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly add third party module accept language.

Do not bump PORTREVISIONs.

Feature safe:   yes

Submitted by:   Mike Stupalov aka landy2005 at gmail dot com
PR:             ports/143787
08 Feb 2010 03:56:37
Original commit files touched by this commit  0.7.65
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update memc (aka advanced memcached) module
from 0.05 to 0.06.

Do not bump PORTREVISIONs.
06 Feb 2010 18:52:56
Original commit files touched by this commit  0.7.65
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update fancyindex module from 0.1_beta5 to 0.2.1.
Remove needless patches.

Do not bump PORTREVISIONs.
04 Feb 2010 10:08:56
Original commit files touched by this commit  0.7.65
 This port version is marked as vulnerable.
osa search for other commits by this committer
Accordingly update gunzip_filter module from 0.1 to 0.2 for
www/nginx and www/nginx-devel.

Do not bump PORTREVISIONs.

Spotted by:     Maxim Dounin aka mdounin at mdounin dot ru
02 Feb 2010 16:19:51
Original commit files touched by this commit  0.7.65
 This port version is marked as vulnerable.
osa search for other commits by this committer
Update from 0.7.64 to 0.7.65.

<ChangeLog>

*) Security: now nginx/Windows ignores trailing spaces in URI.
   Thanks to Dan Crowley, Core Security Technologies.

*) Security: now nginx/Windows ignores short files names.
   Thanks to Dan Crowley, Core Security Technologies.

*) Change: now the "009" status code is written to an access log for
   proxied HTTP/0.9 responses.

*) Change: now the default buffer size of the
   "large_client_header_buffers" directive is 8K.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
18 Jan 2010 19:53:37
Original commit files touched by this commit  0.7.64
 This port version is marked as vulnerable.
osa search for other commits by this committer
This is accordingly update for www/nginx and www/nginx-devel.

Add one more third-party module: upstream_hash, version 0.3.1.
Update slowfs_cache module from 1.2 to 1.3.
Update mogilefs module from 1.0.2 to 1.0.3.

Do not bump PORTREVISIONs.
14 Jan 2010 18:55:41
Original commit files touched by this commit  0.7.64
 This port version is marked as vulnerable.
osa search for other commits by this committer
Use USE_OPENSSL instead of bsd.openssl.mk.

Do not remove default DISTFILES due to port building
failure when third-party module (i.e. additional DISTFILES)
selected.

Do not bump PORTREVISIONs.

PRs:    142831, 142833

Number of commits found: 494 (showing only 100 on this page)

«  1 | 2 | 3 | 4 | 5  »  

Login
User Login
Create account

Servers and bandwidth provided by
New York Internet, SuperNews, and RootBSD

This site
What is FreshPorts?
About the authors
FAQ
How big is it?
The latest upgrade!
Privacy
Forums
Blog
Contact

Search
Enter Keywords:
 
more...

Latest Vulnerabilities
asterisk11Sep 18
squidSep 18
squid33Sep 18
dbusSep 17
nginxSep 16
nginx-develSep 16
phpmyadminSep 13
ossec-hids-clientSep 11
ossec-hids-localSep 11
ossec-hids-serverSep 11
chromiumSep 09
trafficserverSep 05
apache22*Sep 03
apache22-event-mpm*Sep 03
apache22-itk-mpm*Sep 03

8 vulnerabilities affecting 19 ports have been reported in the past 14 days

* - modified, not new

All vulnerabilities


Ports
Home
Categories
Deleted ports
Sanity Test Failures
Newsfeeds


Statistics
Graphs
NEW Graphs (Javascript)
Traffic

Calculated hourly:
Port count 24060
Broken 119
Deprecated 54
Ignore 383
Forbidden 17
Restricted 203
No CDROM 94
Vulnerable 21
Expired 6
Set to expire 49
Interactive 0
new 24 hours 3
new 48 hours4
new 7 days35
new fortnight69
new month229

Servers and bandwidth provided by
New York Internet, SuperNews, and RootBSD
Valid HTML, CSS, and RSS.
Copyright © 2000-2014 Dan Langille. All rights reserved.