No Image

php-fpm.sock failed (13: Permission denied) on nginx

2016-01-12 KENNETH 0

환경 OS : linux(centos6) WEB : nginx-1.8 PHP : php-fpm php-fpm은 포트가 아닌 소켓을 오픈   기본값 : listen = 127.0.0.1:9000 변경값 : listen = /var/php/php-fpm.sock   로그 2016/01/12 07:20:21 [crit] 15637#0: *1 connect() to unix:/var/php/php-fpm.sock failed (13: Permission denied) while connecting to upstream, client: 141.101.83.235, server: greatuser.net, request: “GET /index.php HTTP/1.1”, upstream: “fastcgi://unix:/var/php/php-fpm.sock:”, host: “greatuser.net”, referrer: “https://www.google.co.kr/”   원인 및 처리 php-fpm 과 nginx 의 실행 유저가 맞지 않기 때문에 발생하는 에러.. php-fpm.conf 에 다음과 같이 지정을 해줘야함… user = nobody group = nobody listen.mode = 0666 예제에서는 저렇게 나와 있지만.. nginx 를 구동하는 유저와 동일하게 설정하면 되겠다. listen.mode 역시 0660 이상이면 된다…   그런데 왜 listen 값을 포트에서 유닉스 소켓으로 변경했냐고???? 그건 다음에 알랴줌…

No Image

January 2016 Security Update Release Summary

2016-01-12 KENNETH 0

January 2016 Security Update Release Summary Today we released security updates to provide additional protections against malicious attackers. As a best practice, we encourage customers to apply security updates as soon as they are released. More information about this month’s security updates and advisories can be found in the Security TechNet Library.  MSRC Team Source: January 2016 Security Update Release Summary

No Image

MS16-001 – Critical: Cumulative Security Update for Internet Explorer (3124903) – Version: 1.0

2016-01-12 KENNETH 0

Severity Rating: CriticalRevision Note: V1.0 (January 12, 2016): Bulletin published.Summary: This security update resolves vulnerabilities in Internet Explorer. The more severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Source: ms-security

No Image

3109853 – Update to Improve TLS Session Resumption Interoperability – Version: 1.0

2016-01-12 KENNETH 0

Revision Note: V1.0 (January 12, 2016): Advisory published.Summary: Microsoft is announcing the availability of an update to improve interoperability between Schannel-based TLS clients and 3rd-party TLS servers that enable RFC5077-based resumption and that send the NewSessionTicket message in the abbreviated TLS handshake. The update addresses an issue in schannel.dll that could cause RFC5077 session ticket-based resumption to fail and subsequently cause WinInet-based clients (for example, Internet Explorer and Microsoft Edge) to perform a fallback to a lower TLS protocol version than the one that would have been negotiated otherwise. This improvement is part of ongoing efforts to bolster the effectiveness of encryption in Windows. Source: ms-security