Hacker Newsnew | past | comments | ask | show | jobs | submit | xt's commentslogin

I've been working on a script that does this within Nginx. See https://github.com/torhve/lua-resty-letsencrypt

It's not quite production ready but it shows you it's technically possible


Glowing Bear is helpful on mobile devices without hardware keyboards, still.


Personally I use http://filebin.net/ which has nice and simple looks and uses Drag & Drop for easy uploading. Source available at : https://github.com/espebra/filebin

It is made in Flask and is licensed in AGPL.

Project comes with Vagrant and Puppet-files for easy deploy!


Is drag & drop really easier than just selecting a file from a dialog box? Almost every modern file uploading service has it, but I've never really found it useful. I've always thought of it as a feature that people enable "just because they can."

As a developer, it's pretty rare for me to have the folder containing the file I'd like to upload already open in an Explorer/Finder/whatever window. (I'm more likely to have it open in a terminal.) So it will take exactly the same amount of work for me to navigate to the folder in a dialog box as in an Explorer window.

Even if I happen to have the folder open in Explorer, it's a hassle to move, resize, or otherwise organize my non-tiled windows so that both the file I'd like to drag and the space where I need to drop it are visible at the same time. Larger or multiple screens won't help, as I'll just clutter them up with more windows. I could drag to the taskbar to bring the browser to the foreground, but again that's the kind of hassle that I won't need to incur if I just used the dialog box.

For ordinary people with small-screened laptops and tablets, I assume it will be even harder to keep two apps open in a way so as to enable drag & drop, especially since a lot of people just maximize every window. (Can't blame them when they're stuck with 1366x768 screens and/or platforms that encourage fullscreen apps.)


I love drag & drop with Trello, especially when dragging Skitch screen shots. You don't even have to save the file.


Ha - have you tried dragging a file into the "upload" button on file.io? It works!



> A little less contrast. Black on white? How often do you see that kind of contrast in real life?

While grey on white may look better, actually reading text is easier as black on white.


Isn't that guy sorta missing the point of the first website?


> A little less contrast

> Size Matters

Strong disagree on both of these points. I view most webpages (including that one) at around 66% zoom these days, because the text is so goddamn big. And anyone advocating for less contrast needs a shovel to the head.


anyone advocating for less contrast needs a shovel to the head.

Or they have the thing where high contrast makes the letters jiggle and therefore difficult to read. I get that when tired.

Maximum contrast does not make for good general usability, even if you happen to like it.


This is also my experience. As long as the contrast is within the acceptable WCAG ratios for accessibility, I don't really see any problem.


Very cool. But I was surprised to see he chose Mercator.

See: https://xkcd.com/977/


I thought that too. http://en.wikipedia.org/wiki/Mercator_projection

Which map projections would you choose? A difficult decision: http://en.wikipedia.org/wiki/List_of_map_projections


If you have to do it yourself anyway, why not make your own projection? I'd do a Dymaxion-style projection onto a truncated icosahedron (Goldberg polyhedron G(1,1), a.k.a. the soccer ball shape), with the poles centered in two of the pentagons, and as many edges as possible over bodies of water. Then I'd print each tile image and plaster it to its own mounting board, trimming the backs of the board edges to 69 degrees on all the hexagons and 73.5 degrees on all the pentagons. At that point, I'd permanently join the tiles with appropriate amounts of contiguous land mass, using brackets, and attach magnets to the remaining edges in such a way that you could assemble them like a puzzle.

I'd rather have a gigantic globe (that can also be dismantled for moving or storage) than have a wall map.


Well, if you want something rectangular, preserving area, with vertical meridians then you automatically end up with a cylindrical area projection. If you want an aspect ratio of 3/2 (approximately) you end up with the Gall-Peters projection. Although if you're prepared to cut out part of the map then you have a lot more freedom in your choice.

Edit: Just discovered that if you prefer a conformal map instead of one with equal area then you end up with the Mercator projection.


Robinson or Winkel-tripel like National Geographic does.


Hammer retroazimuthal, back hemisphere. Which is, coincidentally, also my favorite skateboarding move.


This is really cool looking, and I have no idea what you'd use it for.

And this is just the neatest thing to play with: https://www.jasondavies.com/maps/hammer-retroazimuthal/


"As a retroazimuthal projection, azimuths (directions) are correct from any point to the designated center point." (-- Wikipedia, which knows everything and is never wrong.)

It looks like one retroazimuthal variant (the Craig retroazimuthal) is sometimes called the "Mecca projection", so you know which way to kneel at sundown if you're into that sort of thing.


Okay, hipster. Transverse Mercator, south-oriented. https://trac.osgeo.org/proj/wiki/TMSO


Azimuthal equidistant on my house.



I thought that too, but on the other hand it is not readily apparent where you'd get a good non-mercator map raster.


You can just generate one from OpenStreetMaps


How would you approach it? Setting up a renderer with global coverage isn't really a trivial task. It is straightforward, and there are reasonable guides, like https://switch2osm.org/ , but the planet database is just a big database to work with.

(I think I would take advantage of Mapbox's free plan, which allows for 1 custom stylesheet and enough usage to get the image together. I guess there are lots of people who would be happy to render a stylesheet (especially if a modest fee is involved), but I'm not sure how someone on the street figures that out and gets in contact with them)



Yes, I setup a postgres instance a few weeks ago, so that I could render the local area with nik4.py. Lucky for me I already had mapnik and node installed and working, so getting CartoCSS and nik4.py running wasn't a big deal.

I was wondering if you had a specific setup in mind when you said 'just generate', as I did not find the process to be particularly trivial, even for a smaller region (and I do have experience messing around with arcane syntax and command lines).


Sorry, I don't understand


    <head>
        <title>I won't troll Internet Explorer anymore..</title>
        <meta charset="utf-8">
        <meta name="description" content="..because it's about time that I stopped.">


And?

I still don't get it.


so?


What about trolling people that reaches for JavaScript to center text? :-)


Vertical centering usually requires weird hacks (either you know the height in advance and use negative margin, or use tables / display:table)

The part that annoyed me is the vertical centering is not preserved on window resize.


It can be done with flexbox now[1]. Which IE11 also supports[2] :)

[1]http://css-tricks.com/centering-css-complete-guide/#center-v... [2]http://caniuse.com/#feat=flexbox


It uses inotify for file systems that supports it.


So then it DOES have a daemon? Have you actually tried it? And inotify doesn't work over NFS.


I use tup in my web projects to monitor my folders for things to "compile". This includes CoffeScript, MoonScript, SASS/SCSS, Less and more. Very fast and painless.


Here's relevant nginx configuration to disable SSLv3:

  ssl_protocols TLSv1 TLSv1.1 TLSv1.2;
  ssl_ciphers EECDH+AES128:RSA+AES128:EECDH+AES256:RSA+AES256:EECDH+3DES:RSA+3DES:EECDH+RC4:RSA+RC4:!MD5;
  ssl_prefer_server_ciphers on;
This ciphersuite is recommended by CloudFlare.


For those who want to verify their change after updating the configuration (since I looked for such information): either use "nmap --script ssl-enum-ciphers -p 443 <host>" or ssllabs (eg: https://www.ssllabs.com/ssltest/analyze.html?d=wisecashhq.co...) and you will see the enabled protocols.


For those running IIS, use IIS Crypto by Nartac Software for a decent GUI on configuring your protocol and cipher options.


If you use SNI (many domains on one IP), make sure to put this (ssl_protocols TLSv1 TLSv1.1 TLSv1.2;) into the default server { ... } config (or the first one: the one which opens when you go to https://your_server_ip).


Or better yet, don't serve any content from the default. I actually return a 403 error for the default host or any request without a Host header.


The problem is that if you specify ssl_protocols somewhere else rather than default/first server, it won't work. So, yes, serve error, but specify ssl_protocols in there.


Why not just disable the default server? (genuine question; I don't know if there are drawbacks to it)


With name-based virtual hosts (those that rely on the server selecting the appropriate resource based on the Host header), typical clients depend on the IP address returned by DNS for that host. If they visit that IP, ask for the host, and the server isn't configured to deliver that host's resources, it's good practice to give the client an error. Since the web server has to listen on that IP without knowing which host will be requested before the connection is made, it's convenient to have a fallback and handle errors there. I deny all access to the default host, which generates a 403 Forbidden error (with a custom message), but there are definitely other ways to deal with this situation.

The important thing is that a host's protected resources are served only when SSL/TLS is properly negotiated. Serving one host's content as the default when another host was requested violates this.

In practice, nearly all of these requests come from bots, crawlers and penetration testers. So another advantage is that the log entries can be used to block further requests at the firewall, freeing resources and even possibly protecting the server from undisclosed vulnerabilities (test this approach carefully to make sure it's appropriate for your site and doesn't subject you to a DoS).


This works, but from TFA:

"Disabling SSL 3.0 support … presents significant compatibility problems"

"Therefore our recommended response is to support TLS_FALLBACK_SCSV."


Disabling SSLv3 will indeed affect a significant amount of clients in the real world.

I've seen a few commenters here on HN that point out that pretty much everything since Windows XP (ignoring IE6) supports at least 1.0 of the TLS protocols. While that may be correct in theory, in practice it's not.

At a 1MM+ visitors/week site we still see a few percent of our users that regularly connect using SSLv3 across different versions of Windows, including more modern ones such as Windows Vista, 7 and 8(!)

Though I'm not sure why this is the case, antivirus software suites such as McAfee[1] have in the past been known to disable TLS 1.0 system wide in Windows.

[1] http://answers.microsoft.com/en-us/ie/forum/ie8-windows_othe...


It's well-known that the fallback can be triggered by accident, see for instance https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00:

"[...] Also, handshake errors due to network glitches could similarly be misinterpreted as interaction with a legacy server and result in a protocol downgrade."

Perhaps that's what you're seeing.


CloudFlare sees 0.65% of HTTPS traffic using SSL v3 so it's a pretty small impact.


and of that 0.65% - 98% of them have the ability to connect over TLS.

so we're talking 2% of 1% that are dead in the water.


Except if you force downgrade browsers. So they nee to actually support the extension to prevent that.


The point was that if you disable SSLv3, you will cut off some users from your site, but only 0.65%, so it's not that bad of an effect.


Does anyone have any idea what kind of clients would require SSL3 to stay enabled? Old android phones and/or Windows XP perhaps?


Quoting myself (https://news.ycombinator.com/item?id=8453718):

"For clients, a quick look at https://www.ssllabs.com/ssltest/clients.html shows that even older clients (Android 2.3, Java 6, the oldest supported version of IE, etc) support TLS 1.0, so there should be no issues disabling SSLv3 on servers too."


IE6/XP According to Qualsys.


IE6 on XP can actually use TLS, it is just not enabled by default.

But IE8 is readily available on XP so who would use IE6


I think it's probably safe to say that anyone who's using IE6 is either not one who cannot change the defaults (by policy or by skill) or their machine is already malware infested.


Source for the Cloudfare configuration: https://github.com/cloudflare/sslconfig


Firefox disabled a bunch of ciphers on the client side with today's release as well


If you are referring to https://bugzilla.mozilla.org/show_bug.cgi?id=1036765, that was an unrelated change that was made well in advance of my knowledge of this issue.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: