From: "Massimo S." Received: from [192.168.100.201] (HELO mail.2rosenthals.com) by 2rosenthals.com (CommuniGate Pro SMTP 5.4.10) with ESMTPS id 9423525 for ecs-isp@2rosenthals.com; Mon, 08 Apr 2024 04:09:12 -0400 Received: from [192.168.200.201] (port=34974 helo=mail2.2rosenthals.com) by mail.2rosenthals.com with esmtp (Exim 4.96) (envelope-from ) id 1rtk3o-0001Tt-2m for ecs-isp@2rosenthals.com; Mon, 08 Apr 2024 04:09:01 -0400 Received: from mail2.quasarbbs.net ([80.86.52.115]:10066) by mail2.2rosenthals.com with esmtp (Exim 4.96) (envelope-from ) id 1rtk3m-0004VB-2b for ecs-isp@2rosenthals.com; Mon, 08 Apr 2024 04:08:58 -0400 X-SASI-Hits: BODY_SIZE_3000_3999 0.000000, BODY_SIZE_5000_LESS 0.000000, BODY_SIZE_7000_LESS 0.000000, CTE_7BIT 0.000000, HTML_00_01 0.050000, HTML_00_10 0.050000, IN_REP_TO 0.000000, LEGITIMATE_SIGNS 0.000000, MSGID_SAMEAS_FROM_HEX_844412 0.100000, MSG_THREAD 0.000000, REFERENCES 0.000000, REPLYTO_SAMEAS_FROM 0.000000, SENDER_NO_AUTH 0.000000, SUSP_DH_NEG 0.000000, TO_IN_SUBJECT 0.500000, URI_ENDS_IN_HTML 0.000000, __ANY_URI 0.000000, __BANNER_TRUSTED_SENDER 0.000000, __BODY_NO_MAILTO 0.000000, __BOUNCE_CHALLENGE_SUBJ 0.000000, __BOUNCE_NDR_SUBJ_EXEMPT 0.000000, __CP_URI_IN_BODY 0.000000, __CT 0.000000, __CTE 0.000000, __CT_TEXT_PLAIN 0.000000, __DQ_NEG_DOMAIN 0.000000, __DQ_NEG_HEUR 0.000000, __DQ_NEG_IP 0.000000, __EXTORTION_MALWARE 0.000000, __FORWARDED_MSG 0.000000, __FRAUD_URGENCY 0.000000, __FROM_DOMAIN_NOT_IN_BODY 0.000000, __FROM_NAME_NOT_IN_ADDR 0.000000, __FROM_NAME_NOT_IN_BODY 0.000000, __FUR_HEADER 0.000000, __HAS_FROM 0.000000, __HAS_MSGID 0.000000, __HAS_REFERENCES 0.000000, __HAS_REPLYTO 0.000000, __HEADER_ORDER_FROM 0.000000, __HTTPS_URI 0.000000, __IN_REP_TO 0.000000, __MAIL_CHAIN 0.000000, __MIME_BOUND_CHARSET 0.000000, __MIME_TEXT_ONLY 0.000000, __MIME_TEXT_P 0.000000, __MIME_TEXT_P1 0.000000, __MIME_VERSION 0.000000, __MOZILLA_USER_AGENT 0.000000, __MSGID_HEX_844412 0.000000, __MULTIPLE_URI_TEXT 0.000000, __NO_HTML_TAG_RAW 0.000000, __PHISH_COMPR_DIR_NAME 0.000000, __PHISH_SPEAR_SUBJ_SUBJECT 0.000000, __REFERENCES 0.000000, __REPLYTO_SAMEAS_FROM_ACC 0.000000, __REPLYTO_SAMEAS_FROM_ADDY 0.000000, __REPLYTO_SAMEAS_FROM_DOMAIN 0.000000, __RUS_OBFU_PHONE 0.000000, __SANE_MSGID 0.000000, __SCAN_D_NEG 0.000000, __SCAN_D_NEG2 0.000000, __SCAN_D_NEG_HEUR 0.000000, __SCAN_D_NEG_HEUR2 0.000000, __SUBJ_ALPHA_END 0.000000, __SUBJ_ALPHA_NEGATE 0.000000, __SUBJ_REPLY 0.000000, __TO_IN_SUBJECT 0.000000, __TO_MALFORMED_2 0.000000, __TO_NAME 0.000000, __TO_NAME_DIFF_FROM_ACC 0.000000, __TO_REAL_NAMES 0.000000, __URI_IN_BODY 0.000000, __URI_MAILTO 0.000000, __URI_NOT_IMG 0.000000, __URI_NS 0.000000, __URI_WITHOUT_PATH 0.000000, __URI_WITH_PATH 0.000000, __USER_AGENT 0.000000 X-SASI-Probability: 10% X-SASI-RCODE: 200 X-SASI-Version: Antispam-Engine: 5.1.4, AntispamData: 2024.4.8.73017 X-SASI-Hits: BODY_SIZE_3000_3999 0.000000, BODY_SIZE_5000_LESS 0.000000, BODY_SIZE_7000_LESS 0.000000, CTE_7BIT 0.000000, HTML_00_01 0.050000, HTML_00_10 0.050000, IN_REP_TO 0.000000, LEGITIMATE_SIGNS 0.000000, MSGID_SAMEAS_FROM_HEX_844412 0.100000, MSG_THREAD 0.000000, REFERENCES 0.000000, REPLYTO_SAMEAS_FROM 0.000000, SUSP_DH_NEG 0.000000, TO_IN_SUBJECT 0.500000, URI_ENDS_IN_HTML 0.000000, __ANY_URI 0.000000, __AUTH_RES_PASS 0.000000, __BANNER_TRUSTED_SENDER 0.000000, __BODY_NO_MAILTO 0.000000, __BOUNCE_CHALLENGE_SUBJ 0.000000, __BOUNCE_NDR_SUBJ_EXEMPT 0.000000, __CP_URI_IN_BODY 0.000000, __CT 0.000000, __CTE 0.000000, __CT_TEXT_PLAIN 0.000000, __DQ_NEG_DOMAIN 0.000000, __DQ_NEG_HEUR 0.000000, __DQ_NEG_IP 0.000000, __EXTORTION_MALWARE 0.000000, __FORWARDED_MSG 0.000000, __FRAUD_URGENCY 0.000000, __FROM_DOMAIN_NOT_IN_BODY 0.000000, __FROM_NAME_NOT_IN_ADDR 0.000000, __FROM_NAME_NOT_IN_BODY 0.000000, __FUR_HEADER 0.000000, __HAS_FROM 0.000000, __HAS_MSGID 0.000000, __HAS_REFERENCES 0.000000, __HAS_REPLYTO 0.000000, __HEADER_ORDER_FROM 0.000000, __HTTPS_URI 0.000000, __IN_REP_TO 0.000000, __MAIL_CHAIN 0.000000, __MIME_BOUND_CHARSET 0.000000, __MIME_TEXT_ONLY 0.000000, __MIME_TEXT_P 0.000000, __MIME_TEXT_P1 0.000000, __MIME_VERSION 0.000000, __MOZILLA_USER_AGENT 0.000000, __MSGID_HEX_844412 0.000000, __MULTIPLE_URI_TEXT 0.000000, __NO_HTML_TAG_RAW 0.000000, __PHISH_COMPR_DIR_NAME 0.000000, __PHISH_SPEAR_SUBJ_SUBJECT 0.000000, __REFERENCES 0.000000, __REPLYTO_SAMEAS_FROM_ACC 0.000000, __REPLYTO_SAMEAS_FROM_ADDY 0.000000, __REPLYTO_SAMEAS_FROM_DOMAIN 0.000000, __RUS_OBFU_PHONE 0.000000, __SANE_MSGID 0.000000, __SCAN_D_NEG 0.000000, __SCAN_D_NEG2 0.000000, __SCAN_D_NEG_HEUR 0.000000, __SCAN_D_NEG_HEUR2 0.000000, __SUBJ_ALPHA_END 0.000000, __SUBJ_ALPHA_NEGATE 0.000000, __SUBJ_REPLY 0.000000, __TO_IN_SUBJECT 0.000000, __TO_MALFORMED_2 0.000000, __TO_NAME 0.000000, __TO_NAME_DIFF_FROM_ACC 0.000000, __TO_REAL_NAMES 0.000000, __URI_IN_BODY 0.000000, __URI_MAILTO 0.000000, __URI_NOT_IMG 0.000000, __URI_NS 0.000000, __URI_WITHOUT_PATH 0.000000, __URI_WITH_PATH 0.000000, __USER_AGENT 0.000000 X-SASI-Probability: 10% X-SASI-RCODE: 200 X-SASI-Version: Antispam-Engine: 5.1.4, AntispamData: 2024.4.8.73017 Received: from [192.168.10.199] (dtp [192.168.10.199]) by srv2 (Weasel v2.89) for ; Mon, 08 Apr 2024 10:08:55 -0000 Reply-To: ml@ecomstation.it Subject: Re: [eCS-ISP] Fwd: [ANNOUNCEMENT] Apache HTTP Server 2.4.59 Released To: eCS ISP Mailing List References: <1712238846.IXIWFTMQ@httpd.apache.org> Organization: eComStation dot it Message-ID: Date: Mon, 8 Apr 2024 10:08:51 +0200 User-Agent: Mozilla/5.0 (OS/2; U; Warp 4.5; it-IT; rv:1.7.13) Gecko/20060424 Thunderbird/1.0.8 Mnenhy/0.7.4.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: it-IT Content-Transfer-Encoding: 7bit Hi Paul, thank you. Installed on the secondary web server (the one with only html/js websites, no php). It seems to work well. Anyway this VM has a light load. massimo Il 06/04/2024 10:15, Paul Smedley ha scritto: > Hey All, > > OS/2 build (untested) at https://smedley.id.au/tmp/httpd-2.4.59-os2-debug-20240406.zip > > Cheers, > > Paul > > > > -------- Forwarded Message -------- > Subject: [ANNOUNCEMENT] Apache HTTP Server 2.4.59 Released > Date: Thu, 04 Apr 2024 09:54:06 -0400 > From: covener > Reply-To: dev@httpd.apache.org > To: announce@httpd.apache.org > > > > Apache HTTP Server 2.4.59 Released > > April 04, 2024 > > The Apache Software Foundation and the Apache HTTP Server Project > are pleased to announce the release of version 2.4.59 of the Apache > HTTP Server ("Apache"). This version of Apache is our latest GA > release of the new generation 2.4.x branch of Apache HTTPD and > represents fifteen years of innovation by the project, and is > recommended over all previous releases. This release of Apache is > a security, feature and bug fix release. > > We consider this release to be the best version of Apache available, and > encourage users of all prior versions to upgrade. > > Apache HTTP Server 2.4.59 is available for download from: > > https://httpd.apache.org/download.cgi > > Apache 2.4 offers numerous enhancements, improvements, and performance > boosts over the 2.2 codebase. For an overview of new features > introduced since 2.4 please see: > > https://httpd.apache.org/docs/trunk/new_features_2_4.html > > Please see the CHANGES_2.4 file, linked from the download page, for a > full list of changes. A condensed list, CHANGES_2.4.59 includes only > those changes introduced since the prior 2.4 release. A summary of all of the security vulnerabilities > addressed in this and earlier releases is available: > > https://httpd.apache.org/security/vulnerabilities_24.html > > This release requires the Apache Portable Runtime (APR), minimum > version 1.5.x, and APR-Util, minimum version 1.5.x. Some features may > require the 1.6.x version of both APR and APR-Util. The APR libraries > must be upgraded for all features of httpd to operate correctly. > > This release builds on and extends the Apache 2.2 API. Modules written > for Apache 2.2 will need to be recompiled in order to run with Apache > 2.4, and require minimal or no source code changes. > > https://svn.apache.org/repos/asf/httpd/httpd/trunk/VERSIONING > > When upgrading or installing this version of Apache, please bear in mind > that if you intend to use Apache with one of the threaded MPMs (other > than the Prefork MPM), you must ensure that any modules you will be > using (and the libraries they depend on) are thread-safe. > > Please note the 2.2.x branch has now passed the end of life at the Apache > HTTP Server project and no further activity will occur including security > patches. Users must promptly complete their transitions to this 2.4.x > release of httpd to benefit from further bug fixes or new features. > > > -- > This email was Anti Virus checked by Astaro Security Gateway. http://www.sophos.com >