You are viewing a plain text version of this content. The canonical link for it is here.
Posted to cvs@httpd.apache.org by sl...@apache.org on 2003/01/21 03:57:23 UTC
cvs commit: httpd-site/docs index.html
slive 2003/01/20 18:57:23
Modified: xdocs index.xml
docs index.html
Log:
Freshen up the httpd.apache.org main page. Note the new release
and nix the big security blurb.
Revision Changes Path
1.39 +11 -63 httpd-site/xdocs/index.xml
Index: index.xml
===================================================================
RCS file: /home/cvs/httpd-site/xdocs/index.xml,v
retrieving revision 1.38
retrieving revision 1.39
diff -u -d -b -u -r1.38 -r1.39
--- index.xml 28 Oct 2002 17:54:30 -0000 1.38
+++ index.xml 21 Jan 2003 02:57:23 -0000 1.39
@@ -34,78 +34,26 @@
experience.</p>
<p>Please ensure that you <a href="/download.cgi#verify">verify</a>
-any downloads from a mirror!</p>
-</section>
-
-<section id="Security">
-<title>Recent Security Issues</title>
-
-<p>Over the last months several security problems have
-been discovered in the Apache source code and in third-party
-code that many websites rely on. Some of these problems are now
-being actively exploited on the Internet.</p>
-
-<p>Please note that the recent Linux / Apache / mod_ssl / OpenSSL worm
-is exploiting a problem in the <a
-href="http://www.openssl.org/">OpenSSL</a> source code and not a
-problem specific to the Apache HTTP Server source code. To fix this
-problem, you must upgrade your OpenSSL library, not your HTTP Server.</p>
-
-<p>To assure that you are protected, please do the following:</p>
-
-<ul>
-<li>If you are running an SSL-enabled web server using OpenSSL,
-upgrade to at least version 0.9.6e of OpenSSL and recompile all
-applications that use OpenSSL.</li>
-
-<li>Upgrade your Apache HTTP Server to version 1.3.27 or 2.0.43 or
-higher. (Unix systems are safe at version 2.0.39.)</li>
-</ul>
-
-<p>References:</p>
-
-<ul>
-<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0839"> Apache HTTP Server Advisory CAN-2002-0839 (mitre.org)</a></li>
-
-<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0840"> Apache HTTP Server Advisory CAN-2002-0840 (mitre.org)</a></li>
-
-<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0843"> Apache HTTP Server Advisory CAN-2002-0843 (mitre.org)</a></li>
-
-<li><a href="http://www.openssl.org/news/secadv_20020730.txt">OpenSSL
-Security Advisory</a></li>
-
-<li><a href="http://www.cert.org/advisories/CA-2002-27.html">CERT
-Advisory CA-2002-27</a></li>
-
-<li><a href="http://www.cert.org/advisories/CA-2002-23.html">CERT
-Advisory CA-2002-23</a></li>
-
-<li><a href="info/security_bulletin_20020809a.txt">Apache HTTP Server
-Advisory CAN-2002-0661</a></li>
-
-<li><a href="info/security_bulletin_20020620.txt">Apache HTTP Server
-Advisory CAN-2002-0392</a></li>
-
-<li><a href="http://www.cert.org/advisories/CA-2002-17.html">CERT
-Advisory CA-2002-17</a></li>
-</ul>
+your downloads using PGP or MD5 signatures!</p>
</section>
-<section id="2.0.43">
-<title>Apache 2.0.43 Released</title>
+<section id="2.0.44">
+<title>Apache 2.0.44 Released</title>
<p>The Apache HTTP Server Project is proud to <a
href="http://www.apache.org/dist/httpd/Announcement2.html">announce the
-sixth public release of Apache 2.0</a>. Apache 2.0 has been running on the
-apache.org website since December of 2000 and has proven to be very
-reliable.</p>
-<p>
- This release is primarily a Security Fix for <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0840"> CAN-2002-0840 (mitre.org)</a> </p>
+seventh public release of Apache 2.0</a>.</p>
+
+<p>This release begins a new effort to retain configuration and
+module-interface stability in the Apache 2.0 series. No changes
+in configuration or third-party modules are necessary to upgrade from
+2.0.42 or later, and we will make every effort to maintain this easy
+upgrade path in future 2.0 releases.</p>
<p align="center">
<a href="download.cgi">Download</a> |
<a href="docs-2.0/new_features_2_0.html">New Features in Apache 2.0</a> |
-<a href="http://www.apache.org/dist/httpd/CHANGES_2.0">ChangeLog for 2.0.42</a>
+<a href="http://www.apache.org/dist/httpd/CHANGES_2.0">ChangeLog for 2.0</a>
</p>
</section>
1.54 +9 -62 httpd-site/docs/index.html
Index: index.html
===================================================================
RCS file: /home/cvs/httpd-site/docs/index.html,v
retrieving revision 1.53
retrieving revision 1.54
diff -u -d -b -u -r1.53 -r1.54
--- index.html 28 Dec 2002 21:12:17 -0000 1.53
+++ index.html 21 Jan 2003 02:57:23 -0000 1.54
@@ -87,82 +87,29 @@
to use our mirrors that we will be able to provide a better download
experience.</p>
<p>Please ensure that you <a href="/download.cgi#verify">verify</a>
-any downloads from a mirror!</p>
- </blockquote>
- </td></tr>
-</table>
- <table border="0" cellspacing="0" cellpadding="2" width="100%">
- <tr><td bgcolor="#525D76">
- <font color="#ffffff" face="arial,helvetica,sanserif">
- <a name="Security"><strong>Recent Security Issues</strong></a>
- </font>
- </td></tr>
- <tr><td>
- <blockquote>
-<p>Over the last months several security problems have
-been discovered in the Apache source code and in third-party
-code that many websites rely on. Some of these problems are now
-being actively exploited on the Internet.</p>
-<p>Please note that the recent Linux / Apache / mod_ssl / OpenSSL worm
-is exploiting a problem in the <a href="http://www.openssl.org/">OpenSSL</a> source code and not a
-problem specific to the Apache HTTP Server source code. To fix this
-problem, you must upgrade your OpenSSL library, not your HTTP Server.</p>
-<p>To assure that you are protected, please do the following:</p>
-<ul>
-<li>If you are running an SSL-enabled web server using OpenSSL,
-upgrade to at least version 0.9.6e of OpenSSL and recompile all
-applications that use OpenSSL.</li>
-
-<li>Upgrade your Apache HTTP Server to version 1.3.27 or 2.0.43 or
-higher. (Unix systems are safe at version 2.0.39.)</li>
-</ul>
-<p>References:</p>
-<ul>
-<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0839"> Apache HTTP Server Advisory CAN-2002-0839 (mitre.org)</a></li>
-
-<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0840"> Apache HTTP Server Advisory CAN-2002-0840 (mitre.org)</a></li>
-
-<li><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0843"> Apache HTTP Server Advisory CAN-2002-0843 (mitre.org)</a></li>
-
-<li><a href="http://www.openssl.org/news/secadv_20020730.txt">OpenSSL
-Security Advisory</a></li>
-
-<li><a href="http://www.cert.org/advisories/CA-2002-27.html">CERT
-Advisory CA-2002-27</a></li>
-
-<li><a href="http://www.cert.org/advisories/CA-2002-23.html">CERT
-Advisory CA-2002-23</a></li>
-
-<li><a href="info/security_bulletin_20020809a.txt">Apache HTTP Server
-Advisory CAN-2002-0661</a></li>
-
-<li><a href="info/security_bulletin_20020620.txt">Apache HTTP Server
-Advisory CAN-2002-0392</a></li>
-
-<li><a href="http://www.cert.org/advisories/CA-2002-17.html">CERT
-Advisory CA-2002-17</a></li>
-</ul>
+your downloads using PGP or MD5 signatures!</p>
</blockquote>
</td></tr>
</table>
<table border="0" cellspacing="0" cellpadding="2" width="100%">
<tr><td bgcolor="#525D76">
<font color="#ffffff" face="arial,helvetica,sanserif">
- <a name="2.0.43"><strong>Apache 2.0.43 Released</strong></a>
+ <a name="2.0.44"><strong>Apache 2.0.44 Released</strong></a>
</font>
</td></tr>
<tr><td>
<blockquote>
<p>The Apache HTTP Server Project is proud to <a href="http://www.apache.org/dist/httpd/Announcement2.html">announce the
-sixth public release of Apache 2.0</a>. Apache 2.0 has been running on the
-apache.org website since December of 2000 and has proven to be very
-reliable.</p>
-<p>
- This release is primarily a Security Fix for <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0840"> CAN-2002-0840 (mitre.org)</a> </p>
+seventh public release of Apache 2.0</a>.</p>
+<p>This release begins a new effort to retain configuration and
+module-interface stability in the Apache 2.0 series. No changes
+in configuration or third-party modules are necessary to upgrade from
+2.0.42 or later, and we will make every effort to maintain this easy
+upgrade path in future 2.0 releases.</p>
<p align="center">
<a href="download.cgi">Download</a> |
<a href="docs-2.0/new_features_2_0.html">New Features in Apache 2.0</a> |
-<a href="http://www.apache.org/dist/httpd/CHANGES_2.0">ChangeLog for 2.0.42</a>
+<a href="http://www.apache.org/dist/httpd/CHANGES_2.0">ChangeLog for 2.0</a>
</p>
</blockquote>
</td></tr>