forked from AkkomaGang/akkoma
Norm
51f09531c4
Currently Akkoma doesn't have any proper mitigations against BREACH, which exploits the use of HTTP compression to exfiltrate sensitive data. (see: AkkomaGang/akkoma#721 (comment)) To err on the side of caution, disable gzip compression for now until we can confirm that there's some sort of mitigation in place (whether that would be Heal-The-Breach on the Caddy side or any Akkoma-side mitigations). |
||
---|---|---|
.. | ||
apache | ||
caddy | ||
freebsd/rc.d | ||
init.d | ||
netbsd/rc.d | ||
nginx | ||
openbsd | ||
akkoma-mongooseim.cfg | ||
akkoma.service | ||
akkoma.supervisord | ||
akkoma.vcl |