Ryoh's Projects

ryoh/nginx-quic

NGINX packages for CentOS 7/8 This repository provides a QUIC implement version of nginx web server software. nginx quic link quictls link Included modules ngx_http_brotli ngx_http_geoip2 ModSecurity-nginx nginx-module-vts echo-nginx-module headers-more-nginx-module zstd-nginx-module
  • EPEL 7 : x86_64
  • EPEL 8 : x86_64

ryoh/first-project

Description not filled in by author. Very likely personal repository for testing purpose, which you should not use.
  • Fedora rawhide : x86_64

ryoh/ulogd

Userspace logging daemon for netfilter/iptables Project Homepage: https://netfilter.org/projects/ulogd/index.html Mailinglist: http://lists.gnumonks.org/mailman/listinfo/ulogd/ This is just a short README, pleaes see the more extensive documentation in the doc/ subdirectory. ===> IDEA This packages is intended for doing all netfilter related logging inside a userspace process. This includes - logging of ruleset violations via ipt_ULOG (kernel 2.4.18+) - logging of ruleset violations via nfnetlink_log (kernel 2.6.14+) - logging of connection startup/teardown (kernel 2.6.14+) - connection-based accounting (kernel 2.6.14+) ===> CONTENTS = ulogd daemon (ulogd) A sophisticated logging daemon core which uses a plugin for about anything. The daemon provides a plugin API for - input plugins - filter plugins - output plugins = documentation (doc) A quite verbose documentation of this package and it's configuration exists, please actually make use of it and read it :) ===> USAGE To be able to build ulogd, you need to have working developement files and and libraries for: - libnfnetlink - libmnl - libnetfilter_log [optional] - libnetfilter_conntrack [optional] - libnetfilter_acct [optional] Output plugins are build if the needed library and headers are found. This includes: - PCAP: libpcap - PGSQL: libpq - MySQL: libmysqlclient - SQLITE3: libsqlite3 - DBI: libdbi The build procedure is standard: $ ./configure $ make $ sudo make install After build, you need to edit the ulogd.conf file to define a stack or more to use. ===> EXAMPLES = NFLOG usage At first a simple example, which passes every outgoing packet to the userspace logging, using nfnetlink group 3. iptables -A OUTPUT -j NFLOG --nflog-group 3 A more advanced one, passing all incoming tcp packets with destination port 80 to the userspace logging daemon listening on netlink multicast group 32. All packets get tagged with the ulog prefix "inp" iptables -A INPUT -j NFLOG -p tcp --dport 80 --nflog-group 32 --nflog-prefix inp See iptables -j NFLOG -h for complete information about NFLOG. = NFCT usage To use connection logging, simply activate in ulogd.conf one stack using the NFCT plugin. For example, the following stack will do flow-based logging via LOGEMU: stack=ct1:NFCT,ip2str1:IP2STR,print1:PRINTFLOW,emu1:LOGEMU = NFACCT usage On ulogd side, activate a stack using the NFACCT module. You then need to create counters: # nfacct add ipv4.tcp # nfacct add ipv6.tcp.443 Once this is done, you can then create iptables matching rule that will increment each time a packet hit them: # iptables -A FORWARD -p tcp -m nfacct --nfacct-name ipv4.tcp # ip6tables -A FORWARD -p tcp --dport 443 -m nfacct --nfacct-name ipv6.tcp.443 # ip6tables -A FORWARD -p tcp --sport 443 -m nfacct --nfacct-name ipv6.tcp.443 NFACCT plugin will then dump periodically the counters and trigger an update of the output corresponding to the active stacks. ===> COPYRIGHT + CREDITS The code and documentation is (C) 2000-2006 by Harald Welte <laforge@gnumonks.org> (C) 2008-2012 Pablo Neira Ayuso <pablo@netfilter.org> (C) 2008-2013 Eric Leblond <eric@regit.org> Thanks also to the valuable contributions of Daniel Stone, Alexander Janssen, Michael Stolovitzsky and Jozsef Kadlecsik. Credits to Rusty Russell, James Morris, Marc Boucher and all the other netfilter hackers.
  • EPEL 7 : x86_64

ryoh/nginx-unit

NGINX Unit a dynamic application server. nginx unit spec file. https://github.com/nginx/unit Usage git clone nginx-unit.spec cd nginx-unit.spec bash ./prepare.sh Build rpmbuild -ba SPEC/unit.spec Install yum install RPMS/x86_64/unit-VERSION.el7.x86_64.rpm ChangeLog Mon Oct 29: Change bump up version unit: 1.4 -> 1.5
  • EPEL 7 : x86_64

ryoh/nginx-mainline

description nginx mainline custom build (with boringssl and jemalloc) spec nginx 1.19.1 link modules Main modules mod-http-geoip mod-http-image-filter mod-http-perl mod-http-xslt mod-mail mod-stream mod-stream-geoip mod-njs 0.4.2 link Additional modules mod-brotli 1.0.2 link mod-echo 0.61 link mod-headers-more 0.33 link mod-http-lua 0.10.13 link mod-http-lua-upstream 0.07 link mod-memc 0.18 link mod-naxsi 0.55.3 link mod-redis2 0.14 link mod-set-misc 0.31 link mod-srcache 0.31 link mod-vts 0.1.16 link mod-sts 0.1.1 link mod-stream-sts 0.1.1 link mod-pagespeed 1.13.35.2 link mod-security 1.0.0 link Changelog 2020-07-10 bumped version nginx 1.19.1 2018-12-27 change ssl library from boringssl to openssl 1.1.1. and bump up version nginx. 2018-08-16 enhanced TLS 1.3 2018-07-08 add mod-sts 0.1.1, mod-stream-sts 0.1.1, mod-security 1.0.0 2018-07-08 bumped version nginx 1.15.1, libressl 2.7.4 2018-06-07 bumped version nginx 1.15.0, libressl 2.7.3, mod-http-lua 0.10.13 and mod-vts 0.1.16 2018-04-08 bumped version nginx 1.13.11, libressl 2.7.2 and njs 0.2.0 2018-04-04 add modules link and copr status budge 2018-03-28 add copr link 2018-03-27 bumped version nginx 1.13.10 and libressl 2.6.4 2017-11-04 nginx add some modules
  • EPEL 7 : x86_64

ryoh/cronolog-enhanced

Cronolog-enhanced is added a few patches package. added patch is follow this cronolog-setugid-patch.txt cronolog-doc.patch.txt cronolog-define-strptime.patch.txt cronolog-getopt-long.patch.txxt cronolog-missing-symlink-patch.txt cronolog-sigusr1-patch.txt cronolog-strftime-patch.txt cronolog-1.6.2-umask.patch Reference from https://github.com/funtoo/funtoo-staging-unfork
  • EPEL 6 : i386, x86_64
  • EPEL 7 : x86_64