search for: xa_debug

Displaying 6 results from an estimated 6 matches for "xa_debug".

2004 Aug 06
5
Missing headers in Icecast2
Hi Karl, Thanks for your help, About the "Connection:" header, you are right, it's: "Connection: close" and NOT "Connection: keep-alive". The protocol when the SERVER sends the data is http 1.0. It's http 1.1 when the browser requests the data. I don't understand the "Content-Length: 54000000" header either. Also I noticed the flash player on
2004 Aug 06
0
[PATCH] Configurable privileges and chroot jail
...{ + write_log (LOG_DEFAULT, "ERROR: Failed to change to " + "icecast_user %s: %s", info.icecast_user, strerror(errno)); + clean_shutdown (&info); + } + xa_debug(1, "Initialised groups for %s", info.icecast_user); + } + + + if (info.chroot_dir != 0) { + /* Only root can do this */ + if (cuid != 0) { + write_log (LOG_DEFAULT, "ERROR: Don't have privileges to " +...
2004 Aug 06
5
Icecast deadlock with 1.3.12 (fixed)
...le to send data so it kicks the relay and the server is hosed. The potential fix for this is cleaning up the mutex during the transparent_proxy configuration (source.c:681) so it behaves like like the 'alias' one a few lines up. (So a change to the code went from this (line 684): xa_debug (1, "DEBUG: Trying transparent proxy with host: [%s]",req->host); if ((sourcecon = relay_pull_stream (req, &err))) to this: xa_debug (1, "DEBUG: Trying transparent proxy with host: [%s]", req->host); thread_mutex_unlock (&info.mount_mutex); thread_mu...
2004 Aug 06
3
[PATCH] is it of any interest ?
...t;); + } + } else { + kick_not_connected(con, "CGI Script terminated abnormally"); + } + } else { + kick_not_connected(con, "Error in popen"); + } + } else { + kick_not_connected(con, "No CGI Script name"); + } + return; + } +#endif + xa_debug (1, "Looking for mount [%s:%d%s]", req.host, req.port, req.path); /* Try to find a mount point with this name */ --- >8 ---- List archives: http://www.xiph.org/archives/ icecast project homepage: http://www.icecast.org/ To unsubscribe from this list, send a message...
2004 Aug 06
6
URGENT: security exploit fix
...================================================================= RCS file: /cvsroot/icecast/src/source.c,v retrieving revision 1.34 retrieving revision 1.35 diff -u -r1.34 -r1.35 --- source.c 7 Aug 2001 19:16:14 -0000 1.34 +++ source.c 10 Apr 2002 21:36:27 -0000 1.35 @@ -608,7 +608,7 @@ xa_debug (1, "DEBUG: Search local mount points"); - sprintf(pathbuf, "%s:%d%s", req->host[0] ? req->host : "localhost", req->port, req->path); + snprintf(pathbuf, BUFSIZE, "%s:%d%s", req->host[0] ? req->host : "localhost", req->port, r...
2004 Aug 06
6
URGENT: security exploit fix
...================================================================= RCS file: /cvsroot/icecast/src/source.c,v retrieving revision 1.34 retrieving revision 1.35 diff -u -r1.34 -r1.35 --- source.c 7 Aug 2001 19:16:14 -0000 1.34 +++ source.c 10 Apr 2002 21:36:27 -0000 1.35 @@ -608,7 +608,7 @@ xa_debug (1, "DEBUG: Search local mount points"); - sprintf(pathbuf, "%s:%d%s", req->host[0] ? req->host : "localhost", req->port, req->path); + snprintf(pathbuf, BUFSIZE, "%s:%d%s", req->host[0] ? req->host : "localhost", req->port, r...