101010.pl is one of the many independent Mastodon servers you can use to participate in the fediverse.
101010.pl czyli najstarszy polski serwer Mastodon. Posiadamy wpisy do 2048 znaków.

Server stats:

491
active users

#nginx

5 posts5 participants0 posts today
AskUbuntu<p>Nginx not providing certificate <a href="https://ubuntu.social/tags/nginx" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nginx</span></a> <a href="https://ubuntu.social/tags/ssl" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ssl</span></a> <a href="https://ubuntu.social/tags/certificates" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>certificates</span></a> <a href="https://ubuntu.social/tags/nextcloud" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nextcloud</span></a></p><p><a href="https://askubuntu.com/q/1553116/612" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">askubuntu.com/q/1553116/612</span><span class="invisible"></span></a></p>
Conan the Sysadmin<p>For others chasing the moving target of post-quantum cryptography, it seems that openssl-oqs-provider changed the name of the hybrid algorithm p384_mlkem1024 to SecP384r1MLKEM1024 at version 0.9.0, making my nginx.conf file suddenly invalid. Meanwhile, I *think* that Microsoft's indexing bots were about the only clients using pure p384r1.<br><a href="https://mstdn.social/tags/OQS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OQS</span></a> <a href="https://mstdn.social/tags/PQC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PQC</span></a> <a href="https://mstdn.social/tags/PostQuantum" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PostQuantum</span></a> <a href="https://mstdn.social/tags/QuantumSafe" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>QuantumSafe</span></a> <a href="https://mstdn.social/tags/cryptography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cryptography</span></a> <a href="https://mstdn.social/tags/Nginx" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Nginx</span></a></p>
:projetstodon: Shalien<p>Dear <a href="https://mastodon.projetretro.io/tags/fediadmin" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fediadmin</span></a>, regarding the current ongoing full force assault on our services by AI scrappers with all the risks associated (costs, services stability, data being stolen and so on) I can only recommend the setting up of <a href="https://mastodon.projetretro.io/tags/techaro" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>techaro</span></a> <a href="https://mastodon.projetretro.io/tags/anubis" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>anubis</span></a> requests filter to "weight the souls of incoming HTTP requests"</p><p>I tested it so far on <a href="https://mastodon.projetretro.io/tags/alpine" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>alpine</span></a> <a href="https://mastodon.projetretro.io/tags/debian" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>debian</span></a> deployed services with either <a href="https://mastodon.projetretro.io/tags/caddy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>caddy</span></a> , <a href="https://mastodon.projetretro.io/tags/apache2" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>apache2</span></a> / <a href="https://mastodon.projetretro.io/tags/httpd" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>httpd</span></a> and <a href="https://mastodon.projetretro.io/tags/nginx" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nginx</span></a> for the following services <a href="https://mastodon.projetretro.io/tags/nextcloud" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nextcloud</span></a>, <a href="https://mastodon.projetretro.io/tags/mastodon" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>mastodon</span></a>, <a href="https://mastodon.projetretro.io/tags/forgejo" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>forgejo</span></a>, <a href="https://mastodon.projetretro.io/tags/lemmy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>lemmy</span></a>, <a href="https://mastodon.projetretro.io/tags/funkwhale" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>funkwhale</span></a>, <a href="https://mastodon.projetretro.io/tags/bookwyrm" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bookwyrm</span></a> and a <a href="https://mastodon.projetretro.io/tags/minecraft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>minecraft</span></a> <a href="https://mastodon.projetretro.io/tags/mapviewer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>mapviewer</span></a> with little hassle and no big issues</p><p>Following the use of <a href="https://mastodon.projetretro.io/tags/anubis" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>anubis</span></a>, all scrapper (AI and regular) logs dropped drastically and bandwitch usage was cut by two third on the mastodon instance and half for the others services</p><p>Do yourself and your users a favor try it : <a href="https://github.com/TecharoHQ/anubis" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/TecharoHQ/anubis</span><span class="invisible"></span></a></p>
AskUbuntu<p>Is there any way to get status code (XXX) of Nginx except setting up stub_status page? <a href="https://ubuntu.social/tags/nginx" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nginx</span></a></p><p><a href="https://askubuntu.com/q/1552888/612" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">askubuntu.com/q/1552888/612</span><span class="invisible"></span></a></p>
BLACKVOID ⚫️<p>@jhx almost 90 across 5 docker hosts. <a href="https://mastodon.social/tags/ghost" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ghost</span></a> <a href="https://mastodon.social/tags/plex" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>plex</span></a> <a href="https://mastodon.social/tags/vaultwarden" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vaultwarden</span></a>, <a href="https://mastodon.social/tags/mattermost" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>mattermost</span></a> <a href="https://mastodon.social/tags/freshrss" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>freshrss</span></a> <a href="https://mastodon.social/tags/postgres" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>postgres</span></a> <a href="https://mastodon.social/tags/mysql" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>mysql</span></a> <a href="https://mastodon.social/tags/shellngn" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>shellngn</span></a> <a href="https://mastodon.social/tags/midnightcommander" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>midnightcommander</span></a> <a href="https://mastodon.social/tags/sonarr" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sonarr</span></a> <a href="https://mastodon.social/tags/radarr" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>radarr</span></a> <a href="https://mastodon.social/tags/grafana" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>grafana</span></a> <a href="https://mastodon.social/tags/influx" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>influx</span></a> <a href="https://mastodon.social/tags/nginx" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nginx</span></a> <a href="https://mastodon.social/tags/npm" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>npm</span></a> <a href="https://mastodon.social/tags/adguard" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>adguard</span></a> to name a few</p>
Replied in thread

It took a while to get my head around as I’m a complete noob at it, but this afternoon I’ve got Docker and Portainer setup and a container running Nginx.

Also got a cronjob running every 10 minutes to automatically update DNS records in Cloudflare whenever it detects my public IP at home has updated. 😎

Continued thread

Related question, only for people who *have* some need for either authentication or proof-of-work added to their #nginx:

Would you consider #swad if there was a pre-built #package (or port) for your OS? IOW, is building and installing it manually from source an issue?

Just released: #swad 0.12 🥂

swad is the "Simple Web Authentication Daemon". It basically offers adding form + #cookie #authentication to your reverse proxy (designed for and tested with #nginx "auth_request"). I created it mainly to defend against #malicious_bots, so among other credential checker modules for "real" logins, it offers a proof-of-work mechanism for guest logins doing the same #crypto #challenge known from #Anubis.

swad is written in pure #C with minimal dependencies (#zlib, #OpenSSL or compatible, and optionally #PAM), and designed to work on any #POSIX system. It compiles to a small binary (200 - 300 kiB depending on compiler and target platform).

This release brings (among a few bugfixes) improvements to make swad fit for "heavy load" scenarios: There's a new option to balance the load across multiple service worker threads, so all cores can be fully utilized if necessary, and it now keeps lots of transient objects in pools for reuse, which helps to avoid memory fragmentation and ultimately results in lower overall memory consumption.

Read more about it, download the .tar.xz, build and install it .... here:

github.com/Zirias/swad

GitHubGitHub - Zirias/swad: Simple Web Authentication DaemonSimple Web Authentication Daemon. Contribute to Zirias/swad development by creating an account on GitHub.

Thinking about firing up a #VPS to run my own software (wiki, #gotosocial, ???). I want something cheap and lightweight, so I'll probably just manage the server myself. It's been like 10 years since I've done this. Before, I've just run Ubuntu Server, which worked well at the time. I think I used #supervisord to manage services, IIRC, with #nginx as the public gateway w/ manual routing configs. Not sure what is best for this type of hosting now. I want to avoid docker images for efficiency sake.

I'm thinking of developing a new course or workshop in the fall.. would any of these interest you?

#webdev#svelte#html

Seit einigen Tagen werden Medien meiner Mastodon-Instanz metalhead.club global verteilt über ein eigenes CDN ausgeliefert. :goose_hacker:

Das verringert die Latenzen für Benutzer aus nicht-EU Ländern und sorgt für weniger Frust bei den Ladezeiten.

Was ein CDN ist, welche Implementierungsmethoden es gibt und wie ich mein kleines CDN umgesetzt habe, erfahrt ihr in meinem neuen Blogpost:

"Ein eigenes kleines CDN für meine Mastodon-Instanz metalhead.club" - thomas-leister.de/mastodon-med