<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[NGINX (Rift) on OpenBSD: vulnerable?]]></title><description><![CDATA[<p dir="auto">Hi.</p>
<p dir="auto"><em><strong>About <a href="https://depthfirst.com/nginx-rift" rel="nofollow ugc">Nginx: Rift</a> vulnerability:</strong></em><br />
On my OpenBSD (<em>actually on 7.8</em>) server, I use Nginx (<em>v1.28.x</em>)  ­— <em>I known, normally tomorrow, in few hours, v7.9 will be release, and Nginx will release with 1.30.1</em> — and I've some rewrite rules.</p>
<p dir="auto">As we can see on this page, I rewroted my rules.</p>
<p dir="auto">Is-it needed on OpenBSD? Your opinion about, plz.</p>
<p dir="auto">In any case, I think — <em>maybe I'm wrong</em>?! — that it's a good idea to get into the habit of “filtering” rewrite rules this way, don't you think? is-not-it?</p>
]]></description><link>https://billboard.bsd.cafe/topic/184/nginx-rift-on-openbsd-vulnerable</link><generator>RSS for Node</generator><lastBuildDate>Mon, 18 May 2026 15:41:43 GMT</lastBuildDate><atom:link href="https://billboard.bsd.cafe/topic/184.rss" rel="self" type="application/rss+xml"/><pubDate>Mon, 18 May 2026 13:26:52 GMT</pubDate><ttl>60</ttl></channel></rss>