Fortitude HTTP Changelog

What's new in Fortitude HTTP 1.0.4.1

Jul 8, 2018
  • Modified custom filters to allow outgoing buffers to be modified.
  • Added new custom filter type: On Before Compression.
  • Included new filter to minify outgoing data.
  • Resolved issue which causes SSI data not to be compressed.
  • Consolidated projects into one Visual Studio solution.
  • Upgraded platform SDK for Windows 10.
  • Resolved several x64 bugs which were very unlikely to be encountered.
  • Resolved buffer overrun when using long virtual root paths.
  • Resolved incorrect PDB on 64bit installer.
  • Resolved memory leak caused by duplicate allocations.

New in Fortitude HTTP 1.0.4.0 (Mar 31, 2015)

  • Resolved issue with anti image-leaching/direct-linking which caused feature to remain enabled after disabling it.
  • Implemented permanent redirect on non-trailing-slash requests for directories.
  • Implemented thread-pump spin counter to greatly increase network throughput.
  • Further refinement has been made as of the 2/18/2013 release.
  • Fixed erroneously disabled browse button on virtual root configuration dialog.
  • Implemented CPU affinity, process and thread priority boost.
  • Implemented setting to ignore binding errors.
  • Implemented setting to allow the server to be optimized for throughput (LAN vs. WAN).

New in Fortitude HTTP 1.0.3.9 (Mar 31, 2015)

  • Resolved server dialog validation issues which allowed for invalid configurations
  • Included full server documentation in HTML format
  • Resolved issue which caused domain credentials not to be saved for website root

New in Fortitude HTTP 1.0.3.8 (Mar 31, 2015)

  • Retooled internal resource locking mechanism.
  • Updated mime types for many common data types.
  • Furthered the reach of the global memory tracker (CMemPool) adding substantial memory leak detection.
  • Implemented first phase of the debug console when compiled in debug mode.
  • Resolved buffer overrun when accessing file from within a deep virtual root.
  • Resolved small memory leak when accessing virtual roots.
  • Resolved memory exception when tracing initialization error stacks.
  • Resolved issue which prematurely decoded the query string causing it to be decoded multiple times.
  • Expanded custom error pages adding per-site configuration.
  • Implemented support for custom scripting engine driven error pages.
  • New environment variables (ORIGINAL_*) can be used to identify the original request.
  • Resolved issue introduced in the last beta which caused the server to crash when receiving an invalid header.
  • Resolved issues with custom error pages not sending a header on subsequent keep-alive connections.
  • Resolved issue with nested errors (what happens when an error occurs while sending an error).
  • Since the browser can only receive one error response, only the originating error is sent to the peer.
  • Implemented forward only hashing of server user passwords.
  • Breaking change: Implemented reversible encryption of domain credentials on virtual roots and website root.
  • If you have NT credentials supplied for your roots, you'll need to reenter them.
  • Resolved user impersonation for website root and virtual roots.
  • Resolved issue which mixed up URL vs. Query string filtering.
  • Reworked CGI engine stdio pumping, the response time should be much faster now.
  • Now using non-blocking pipe I/O.
  • Fixed-up internal 500 error reporting to be much more specific by reporting the textual GetLastError().
  • Resolved minor memory leak in the service cause when a setting is switched from local to global.
  • Added require-administrator element to the application manifest for automatic UAC elevation.
  • Revisited custom filter DLLs. Included new example project for "Super Verbose" message box logging.
  • Implemented the ability to alter server header/request information through the custom filters.
  • Implemented image anti-leaching support (Under website advanced settings).
  • Resolved issue where trailing CR or CRLFs were not preserved on post-data.
  • Reworked Scripting Engine parameter engine.

New in Fortitude HTTP 1.0.3.7 (Mar 31, 2015)

  • Corrected GUI animation transparencies using 8bit imaging masks
  • Reduced service memory footprint by 50 percent by centralizing a single buffer
  • Reduced memory footprint after a high-load by reallocating (shrinking) shared buffers when idle
  • Resolved error: "The specified script was not found"
  • Simplified allocation of configuration memory
  • Auto-correct slashes in virtual root directories
  • Added receive buffering and removed unnecessary steps from file send buffering
  • Resolved issues with incorrect PATHINFO, PATHTRANSLATED and SCRIPT_NAME environment variables
  • During uninstall, the service is now stopped if it is running. An uninstall icon has also been added to the start menu
  • Implemented feature to enable the use of scripting engines and SSI in custom error pages
  • Added new "duration" field to server logging - this works best with log caching disabled
  • Implemented "304-Not Modified" response for client side caching
  • Implemented configurable scripting-engine error code checking
  • This can be configured/disabled from the script-engine configuration dialog
  • Resolved undefined behavior of scripts which return no content type
  • The server will use (in this order), (1) the content type returned from the script, (2) the configured content type of the script extension, or (3) binary/octet-stream
  • Resolved bug which could potentially allow directory indexing on cg-bins
  • Corrected SSE (Simple Scripting Engine) examples to conform with the current version
  • Re-engineered the included PostTest.exe for more reliable testing of post-backs
  • Script execution is now terminated if the remote peer disconnects
  • Included PDB files for native debugging - this will be included in all future versions

New in Fortitude HTTP 1.0.3.6 (Mar 31, 2015)

  • Implemented ability to limit the dynamic buffer to reduce memory load
  • Implemented ability to set the file buffer size to tweak transfer speeds / memory load
  • Resolved user-management grid manipulation errors which occurred when more than one user was deleted
  • Increased default size of internal file-buffer for greater I/O throughput
  • Added additional UI threads for asynchronous communication with the server

New in Fortitude HTTP 1.0.3.5 (Mar 31, 2015)

  • Fixed randomization event which could cause the server to be crashed under an extreme load.
  • Resolved potentially long shutdown times. This was due to an necessary lock which would need to time-out.

New in Fortitude HTTP 1.0.3.4 (Mar 31, 2015)

  • Changed default management port to 35634 to reduce conflicts with firewalls.
  • This can be changed via registry entry "HKEY_LOCAL_MACHINE\SOFTWARE\NetworkDLS\Fortitude HTTP\ManagementPort"
  • Implemented the ability to connect to different ports using host:port notation.

New in Fortitude HTTP 1.0.3.3 (Mar 31, 2015)

  • Resolved issue which would cause SSI pages to throw max-nesting-depth errors when server is under high load.
  • Changed the default content type of CGI processes to application/octet-stream when the type is absent from the CGI processes response.
  • Included first version of documentation - revisions will be made alongside subsequent releases.

New in Fortitude HTTP 1.0.3.2 (Mar 31, 2015)

  • Resolved the sending of extraneous line-feed character after post data.
  • Resolved issues with incorrect REQUEST_URI and DOCUMENT_URI variables in CGI and SSI respectively.
  • Resolved small memory leak which occurred when binding socket pools to specific IP addresses.

New in Fortitude HTTP 1.0.3.1 (Mar 31, 2015)

  • Fixed re-issue of content-type header when scripting engine prefixed its content-type with line feeds.
  • Resolved issue with SCRIPT_FILENAME environment variable when executing CGI from SSI directive.
  • Fixed potential stack overflow caused by nesting SSI includes and CGI executions.
  • Throughly tested several 3rd party web-applications in PERL and PHP.
  • Scripting engines: ActivePerl 5.12.2, Strawberry Perl 5.12.2.0 and PHP 5.3.5
  • Applications: Boardawy Forum, phpMyAdmin, SquirrelMail, Drupal, osCommerce, Joomla, Magento, Mediawiki, phpBB, Wordpress.
  • Supporting applications: SQL Server 2008, MySql 5.5.9.

New in Fortitude HTTP 1.0.1.7 (Jun 17, 2010)

  • Introduced full support for the 32-bit and 64-bit windows 2008,
  • Vista and 7.
  • Implemented remote management. The management application connects to the service on TCPIP port 76947.
  • The service now keeps track of any errors in the "{installed folder}\ErrorLogs\" folder.
  • Removed support for standalone process, the server must be run as a service.
  • Split the service and GUI into separate processes for stability purposes.