mirror of https://akkoma.dev/AkkomaGang/akkoma
51f09531c4
Currently Akkoma doesn't have any proper mitigations against BREACH, which exploits the use of HTTP compression to exfiltrate sensitive data. (see: https://akkoma.dev/AkkomaGang/akkoma/pulls/721#issuecomment-11487) To err on the side of caution, disable gzip compression for now until we can confirm that there's some sort of mitigation in place (whether that would be Heal-The-Breach on the Caddy side or any Akkoma-side mitigations). |
||
---|---|---|
.. | ||
apache | ||
caddy | ||
freebsd/rc.d | ||
init.d | ||
netbsd/rc.d | ||
nginx | ||
openbsd | ||
akkoma-mongooseim.cfg | ||
akkoma.service | ||
akkoma.supervisord | ||
akkoma.vcl |