archive-com.com » COM » C » CAPITALSAFETY.COM

Total: 175

Choose link from "Titles, links and description words view":

Or switch to "Titles and links view".
  • Test Page for the Apache Web Server on Red Hat Linux
    page Note that until you do so people visiting your website will see this page and not your content If you have upgraded from Red Hat Linux 6 2 and earlier then you are seeing this page because the default DocumentRoot set in etc httpd conf httpd conf has changed Any subdirectories which existed under home httpd should now be moved to var www Alternatively the contents of var www can be moved to home httpd and the configuration file can be updated accordingly If you are a member of the general public The fact that you are seeing this page indicates that the website you just visited is either experiencing problems or is undergoing routine maintenance If you would like to let the administrators of this website know that you ve seen this page instead of the page you expected you should send them e mail In general mail sent to the name webmaster and directed to the website s domain should reach the appropriate person For example if you experienced problems while visiting www example com you should send e mail to webmaster example com The Apache documentation has been included with this distribution For documentation and information

    Original URL path: http://bc.capitalsafety.com/ (2016-02-16)
    Open archived version from archive


  • core - Apache HTTP Server
    500 http foo example com cgi bin tester ErrorDocument 404 cgi bin bad urls pl ErrorDocument 401 subscription info html ErrorDocument 403 Sorry can t allow you access today Additionally the special value default can be used to specify Apache s simple hardcoded message While not required under normal circumstances default will restore Apache s simple hardcoded message for configurations that would otherwise inherit an existing ErrorDocument ErrorDocument 404 cgi bin bad urls pl Directory web docs ErrorDocument 404 default Directory Note that when you specify an ErrorDocument that points to a remote URL ie anything with a method such as http in front of it Apache will send a redirect to the client to tell it where to find the document even if the document ends up being on the same server This has several implications the most important being that the client will not receive the original error status code but instead will receive a redirect status code This in turn can confuse web robots and other clients which try to determine if a URL is valid using the status code In addition if you use a remote URL in an ErrorDocument 401 the client will not know to prompt the user for a password since it will not receive the 401 status code Therefore if you use an ErrorDocument 401 directive then it must refer to a local document Microsoft Internet Explorer MSIE will by default ignore server generated error messages when they are too small and substitute its own friendly error messages The size threshold varies depending on the type of error but in general if you make your error document greater than 512 bytes then MSIE will show the server generated error rather than masking it More information is available in Microsoft Knowledge Base article Q294807 Although most error messages can be overriden there are certain circumstances where the internal messages are used regardless of the setting of ErrorDocument In particular if a malformed request is detected normal request processing will be immediately halted and the internal error message returned This is necessary to guard against security problems caused by bad requests Prior to version 2 0 messages were indicated by prefixing them with a single unmatched double quote character See also documentation of customizable responses ErrorLog Directive Description Location where the server will log errors Syntax ErrorLog file path syslog facility Default ErrorLog logs error log Unix ErrorLog logs error log Windows and OS 2 Context server config virtual host Status Core Module core The ErrorLog directive sets the name of the file to which the server will log any errors it encounters If the file path is not absolute then it is assumed to be relative to the ServerRoot Example ErrorLog var log httpd error log If the file path begins with a pipe then it is assumed to be a command to spawn to handle the error log Example ErrorLog usr local bin httpd errors Using syslog instead of a filename enables logging via syslogd 8 if the system supports it The default is to use syslog facility local7 but you can override this by using the syslog facility syntax where facility can be one of the names usually documented in syslog 1 Example ErrorLog syslog user SECURITY See the security tips document for details on why your security could be compromised if the directory where log files are stored is writable by anyone other than the user that starts the server Note When entering a file path on non Unix platforms care should be taken to make sure that only forward slashed are used even though the platform may allow the use of back slashes In general it is a good idea to always use forward slashes throughout the configuration files See also LogLevel Apache Log Files FileETag Directive Description File attributes used to create the ETag HTTP response header Syntax FileETag component Default FileETag INode MTime Size Context server config virtual host directory htaccess Override FileInfo Status Core Module core The FileETag directive configures the file attributes that are used to create the ETag entity tag response header field when the document is based on a file The ETag value is used in cache management to save network bandwidth In Apache 1 3 22 and earlier the ETag value was always formed from the file s inode size and last modified time mtime The FileETag directive allows you to choose which of these if any should be used The recognized keywords are INode The file s i node number will be included in the calculation MTime The date and time the file was last modified will be included Size The number of bytes in the file will be included All All available fields will be used This is equivalent to FileETag INode MTime Size None If a document is file based no ETag field will be included in the response The INode MTime and Size keywords may be prefixed with either or which allow changes to be made to the default setting inherited from a broader scope Any keyword appearing without such a prefix immediately and completely cancels the inherited setting If a directory s configuration includes FileETag INode MTime Size and a subdirectory s includes FileETag INode the setting for that subdirectory which will be inherited by any sub subdirectories that don t override it will be equivalent to FileETag MTime Size Files Directive Description Contains directives that apply to matched filenames Syntax Files filename Files Context server config virtual host directory htaccess Override All Status Core Module core The Files directive limits the scope of the enclosed directives by filename It is comparable to the Directory and Location directives It should be matched with a Files directive The directives given within this section will be applied to any object with a basename last component of filename matching the specified filename Files sections are processed in the order they appear in the configuration file after the Directory sections and htaccess files are read but before Location sections Note that Files can be nested inside Directory sections to restrict the portion of the filesystem they apply to The filename argument should include a filename or a wild card string where matches any single character and matches any sequences of characters Regular expressions can also be used with the addition of the character For example Files gif jpe g png would match most common Internet graphics formats FilesMatch is preferred however Note that unlike Directory and Location sections Files sections can be used inside htaccess files This allows users to control access to their own files at a file by file level See also How Directory Location and Files sections work for an explanation of how these different sections are combined when a request is received FilesMatch Directive Description Contains directives that apply to regular expression matched filenames Syntax FilesMatch regex FilesMatch Context server config virtual host directory htaccess Override All Status Core Module core The FilesMatch directive limits the scope of the enclosed directives by filename just as the Files directive does However it accepts a regular expression For example FilesMatch gif jpe g png would match most common Internet graphics formats See also How Directory Location and Files sections work for an explanation of how these different sections are combined when a request is received ForceType Directive Description Forces all matching files to be served with the specified MIME content type Syntax ForceType MIME type None Context directory htaccess Override FileInfo Status Core Module core Compatibility Moved to the core in Apache 2 0 When placed into an htaccess file or a Directory or Location or Files section this directive forces all matching files to be served with the content type identification given by MIME type For example if you had a directory full of GIF files but did not want to label them all with gif you might want to use ForceType image gif Note that unlike DefaultType this directive overrides all mime type associations including filename extensions that might identify the media type You can override any ForceType setting by using the value of None force all files to be image gif Location images ForceType image gif Location but normal mime type associations here Location images mixed ForceType None Location HostnameLookups Directive Description Enables DNS lookups on client IP addresses Syntax HostnameLookups On Off Double Default HostnameLookups Off Context server config virtual host directory Status Core Module core This directive enables DNS lookups so that host names can be logged and passed to CGIs SSIs in REMOTE HOST The value Double refers to doing double reverse DNS lookup That is after a reverse lookup is performed a forward lookup is then performed on that result At least one of the IP addresses in the forward lookup must match the original address In tcpwrappers terminology this is called PARANOID Regardless of the setting when mod authz host is used for controlling access by hostname a double reverse lookup will be performed This is necessary for security Note that the result of this double reverse isn t generally available unless you set HostnameLookups Double For example if only HostnameLookups On and a request is made to an object that is protected by hostname restrictions regardless of whether the double reverse fails or not CGIs will still be passed the single reverse result in REMOTE HOST The default is Off in order to save the network traffic for those sites that don t truly need the reverse lookups done It is also better for the end users because they don t have to suffer the extra latency that a lookup entails Heavily loaded sites should leave this directive Off since DNS lookups can take considerable amounts of time The utility logresolve compiled by default to the bin subdirectory of your installation directory can be used to look up host names from logged IP addresses offline IfDefine Directive Description Encloses directives that will be processed only if a test is true at startup Syntax IfDefine parameter name IfDefine Context server config virtual host directory htaccess Override All Status Core Module core The IfDefine test IfDefine section is used to mark directives that are conditional The directives within an IfDefine section are only processed if the test is true If test is false everything between the start and end markers is ignored The test in the IfDefine section directive can be one of two forms parameter name parameter name In the former case the directives between the start and end markers are only processed if the parameter named parameter name is defined The second format reverses the test and only processes the directives if parameter name is not defined The parameter name argument is a define as given on the httpd command line via D parameter at the time the server was started IfDefine sections are nest able which can be used to implement simple multiple parameter tests Example httpd DReverseProxy httpd conf IfDefine ReverseProxy LoadModule rewrite module modules mod rewrite so LoadModule proxy module modules libproxy so IfDefine IfModule Directive Description Encloses directives that are processed conditional on the presence or absence of a specific module Syntax IfModule module file module identifier IfModule Context server config virtual host directory htaccess Override All Status Core Module core Compatibility Module identifiers are available in version 2 1 and later The IfModule test IfModule section is used to mark directives that are conditional on the presence of a specific module The directives within an IfModule section are only processed if the test is true If test is false everything between the start and end markers is ignored The test in the IfModule section directive can be one of two forms module module In the former case the directives between the start and end markers are only processed if the module named module is included in Apache either compiled in or dynamically loaded using LoadModule The second format reverses the test and only processes the directives if module is not included The module argument can be either the module identifier or the file name of the module at the time it was compiled For example rewrite module is the identifier and mod rewrite c is the file name If a module consists of several source files use the name of the file containing the string STANDARD20 MODULE STUFF IfModule sections are nest able which can be used to implement simple multiple module tests This section should only be used if you need to have one configuration file that works whether or not a specific module is available In normal operation directives need not be placed in IfModule sections Include Directive Description Includes other configuration files from within the server configuration files Syntax Include file path directory path Context server config virtual host directory Status Core Module core Compatibility Wildcard matching available in 2 0 41 and later This directive allows inclusion of other configuration files from within the server configuration files Shell style fnmatch wildcard characters can be used to include several files at once in alphabetical order In addition if Include points to a directory rather than a file Apache will read all files in that directory and any subdirectory But including entire directories is not recommended because it is easy to accidentally leave temporary files in a directory that can cause httpd to fail The file path specified may be an absolute path or may be relative to the ServerRoot directory Examples Include usr local apache2 conf ssl conf Include usr local apache2 conf vhosts conf Or providing paths relative to your ServerRoot directory Include conf ssl conf Include conf vhosts conf Running apachectl configtest will give you a list of the files that are being processed during the configuration check root host apachectl configtest Processing config file usr local apache2 conf ssl conf Processing config file usr local apache2 conf vhosts vhost1 conf Processing config file usr local apache2 conf vhosts vhost2 conf Syntax OK See also apachectl KeepAlive Directive Description Enables HTTP persistent connections Syntax KeepAlive On Off Default KeepAlive On Context server config virtual host Status Core Module core The Keep Alive extension to HTTP 1 0 and the persistent connection feature of HTTP 1 1 provide long lived HTTP sessions which allow multiple requests to be sent over the same TCP connection In some cases this has been shown to result in an almost 50 speedup in latency times for HTML documents with many images To enable Keep Alive connections set KeepAlive On For HTTP 1 0 clients Keep Alive connections will only be used if they are specifically requested by a client In addition a Keep Alive connection with an HTTP 1 0 client can only be used when the length of the content is known in advance This implies that dynamic content such as CGI output SSI pages and server generated directory listings will generally not use Keep Alive connections to HTTP 1 0 clients For HTTP 1 1 clients persistent connections are the default unless otherwise specified If the client requests it chunked encoding will be used in order to send content of unknown length over persistent connections See also MaxKeepAliveRequests KeepAliveTimeout Directive Description Amount of time the server will wait for subsequent requests on a persistent connection Syntax KeepAliveTimeout seconds Default KeepAliveTimeout 5 Context server config virtual host Status Core Module core The number of seconds Apache will wait for a subsequent request before closing the connection Once a request has been received the timeout value specified by the Timeout directive applies Setting KeepAliveTimeout to a high value may cause performance problems in heavily loaded servers The higher the timeout the more server processes will be kept occupied waiting on connections with idle clients Limit Directive Description Restrict enclosed access controls to only certain HTTP methods Syntax Limit method method Limit Context server config virtual host directory htaccess Override All Status Core Module core Access controls are normally effective for all access methods and this is the usual desired behavior In the general case access control directives should not be placed within a Limit section The purpose of the Limit directive is to restrict the effect of the access controls to the nominated HTTP methods For all other methods the access restrictions that are enclosed in the Limit bracket will have no effect The following example applies the access control only to the methods POST PUT and DELETE leaving all other methods unprotected Limit POST PUT DELETE Require valid user Limit The method names listed can be one or more of GET POST PUT DELETE CONNECT OPTIONS PATCH PROPFIND PROPPATCH MKCOL COPY MOVE LOCK and UNLOCK The method name is case sensitive If GET is used it will also restrict HEAD requests The TRACE method cannot be limited A LimitExcept section should always be used in preference to a Limit section when restricting access since a LimitExcept section provides protection against arbitrary methods LimitExcept Directive Description Restrict access controls to all HTTP methods except the named ones Syntax LimitExcept method method LimitExcept Context server config virtual host directory htaccess Override All Status Core Module core LimitExcept and LimitExcept are used to enclose a group of access control directives which will then apply to any HTTP access method not listed in the arguments i e it is the opposite of a Limit section and can be used to control both standard and nonstandard unrecognized methods See the documentation for Limit for more details For example LimitExcept POST GET Require valid user LimitExcept LimitInternalRecursion Directive Description Determine maximum number of internal redirects and nested subrequests Syntax LimitInternalRecursion number number Default LimitInternalRecursion 10 Context server config virtual host Status Core Module core Compatibility Available in Apache 2 0 47 and later An internal redirect happens for example when using the Action directive which internally redirects the original request to a CGI script A subrequest is Apache s mechanism to find out what would happen for some URI if it were requested For example mod dir uses subrequests to look for the files listed in the DirectoryIndex directive LimitInternalRecursion prevents the server from crashing when entering an infinite loop of internal redirects or subrequests Such loops are usually caused by misconfigurations The directive stores two different limits which are evaluated on per request basis The first number is the maximum number of internal redirects that may follow each other The second number determines how deep subrequests may be nested If you specify only one number it will be assigned to both limits Example LimitInternalRecursion 5 LimitRequestBody Directive Description Restricts the total size of the HTTP request body sent from the client Syntax LimitRequestBody bytes Default LimitRequestBody 0 Context server config virtual host directory htaccess Override All Status Core Module core This directive specifies the number of bytes from 0 meaning unlimited to 2147483647 2GB that are allowed in a request body The LimitRequestBody directive allows the user to set a limit on the allowed size of an HTTP request message body within the context in which the directive is given server per directory per file or per location If the client request exceeds that limit the server will return an error response instead of servicing the request The size of a normal request message body will vary greatly depending on the nature of the resource and the methods allowed on that resource CGI scripts typically use the message body for retrieving form information Implementations of the PUT method will require a value at least as large as any representation that the server wishes to accept for that resource This directive gives the server administrator greater control over abnormal client request behavior which may be useful for avoiding some forms of denial of service attacks If for example you are permitting file upload to a particular location and wish to limit the size of the uploaded file to 100K you might use the following directive LimitRequestBody 102400 LimitRequestFields Directive Description Limits the number of HTTP request header fields that will be accepted from the client Syntax LimitRequestFields number Default LimitRequestFields 100 Context server config Status Core Module core Number is an integer from 0 meaning unlimited to 32767 The default value is defined by the compile time constant DEFAULT LIMIT REQUEST FIELDS 100 as distributed The LimitRequestFields directive allows the server administrator to modify the limit on the number of request header fields allowed in an HTTP request A server needs this value to be larger than the number of fields that a normal client request might include The number of request header fields used by a client rarely exceeds 20 but this may vary among different client implementations often depending upon the extent to which a user has configured their browser to support detailed content negotiation Optional HTTP extensions are often expressed using request header fields This directive gives the server administrator greater control over abnormal client request behavior which may be useful for avoiding some forms of denial of service attacks The value should be increased if normal clients see an error response from the server that indicates too many fields were sent in the request For example LimitRequestFields 50 LimitRequestFieldSize Directive Description Limits the size of the HTTP request header allowed from the client Syntax LimitRequestFieldsize bytes Default LimitRequestFieldsize 8190 Context server config Status Core Module core This directive specifies the number of bytes that will be allowed in an HTTP request header The LimitRequestFieldSize directive allows the server administrator to reduce or increase the limit on the allowed size of an HTTP request header field A server needs this value to be large enough to hold any one header field from a normal client request The size of a normal request header field will vary greatly among different client implementations often depending upon the extent to which a user has configured their browser to support detailed content negotiation SPNEGO authentication headers can be up to 12392 bytes This directive gives the server administrator greater control over abnormal client request behavior which may be useful for avoiding some forms of denial of service attacks For example LimitRequestFieldSize 4094 Under normal conditions the value should not be changed from the default LimitRequestLine Directive Description Limit the size of the HTTP request line that will be accepted from the client Syntax LimitRequestLine bytes Default LimitRequestLine 8190 Context server config Status Core Module core This directive sets the number of bytes that will be allowed on the HTTP request line The LimitRequestLine directive allows the server administrator to reduce or increase the limit on the allowed size of a client s HTTP request line Since the request line consists of the HTTP method URI and protocol version the LimitRequestLine directive places a restriction on the length of a request URI allowed for a request on the server A server needs this value to be large enough to hold any of its resource names including any information that might be passed in the query part of a GET request This directive gives the server administrator greater control over abnormal client request behavior which may be useful for avoiding some forms of denial of service attacks For example LimitRequestLine 4094 Under normal conditions the value should not be changed from the default LimitXMLRequestBody Directive Description Limits the size of an XML based request body Syntax LimitXMLRequestBody bytes Default LimitXMLRequestBody 1000000 Context server config virtual host directory htaccess Override All Status Core Module core Limit in bytes on maximum size of an XML based request body A value of 0 will disable any checking Example LimitXMLRequestBody 0 Location Directive Description Applies the enclosed directives only to matching URLs Syntax Location URL path URL Location Context server config virtual host Status Core Module core The Location directive limits the scope of the enclosed directives by URL It is similar to the Directory directive and starts a subsection which is terminated with a Location directive Location sections are processed in the order they appear in the configuration file after the Directory sections and htaccess files are read and after the Files sections Location sections operate completely outside the filesystem This has several consequences Most importantly Location directives should not be used to control access to filesystem locations Since several different URLs may map to the same filesystem location such access controls may by circumvented When to use Location Use Location to apply directives to content that lives outside the filesystem For content that lives in the filesystem use Directory and Files An exception is Location which is an easy way to apply a configuration to the entire server For all origin non proxy requests the URL to be matched is a URL path of the form path No scheme hostname port or query string may be included For proxy requests the URL to be matched is of the form scheme servername path and you must include the prefix The URL may use wildcards In a wild card string matches any single character and matches any sequences of characters Regular expressions can also be used with the addition of the character For example Location extra special data would match URLs that contained the substring extra data or special data The directive LocationMatch behaves identical to the regex version of Location The Location functionality is especially useful when combined with the SetHandler directive For example to enable status requests but allow them only from browsers at foo com you might use Location status SetHandler server status Order Deny Allow Deny from all Allow from foo com Location Note about slash The slash character has special meaning depending on where in a URL it appears People may be used to its behavior in the filesystem where multiple adjacent slashes are frequently collapsed to a single slash i e home foo is the same as home foo In URL space this is not necessarily true The LocationMatch directive and the regex version of Location require you to explicitly specify multiple slashes if that is your intention For example LocationMatch abc would match the request URL abc but not the request URL abc The non regex Location directive behaves similarly when used for proxy requests But when non regex Location is used for non proxy requests it will implicitly match multiple slashes with a single slash For example if you specify Location abc def and the request is to abc def then it will match See also How Directory Location and Files sections work for an explanation of how these different sections are combined when a request is received LocationMatch Directive Description Applies the enclosed directives only to regular expression matching URLs Syntax LocationMatch regex LocationMatch Context server config virtual host Status Core Module core The LocationMatch directive limits the scope of the enclosed directives by URL in an identical manner to Location However it takes a regular expression as an argument instead of a simple string For example LocationMatch extra special data would match URLs that contained the substring extra data or special data See also How Directory Location and Files sections work for an explanation of how these different sections are combined when a request is received LogLevel Directive Description Controls the verbosity of the ErrorLog Syntax LogLevel level Default LogLevel warn Context server config virtual host Status Core Module core LogLevel adjusts the verbosity of the messages recorded in the error logs see ErrorLog directive The following level s are available in order of decreasing significance Level Description Example emerg Emergencies system is unusable Child cannot open lock file Exiting alert Action must be taken immediately getpwuid couldn t determine user name from uid crit Critical Conditions socket Failed to get a socket exiting child error Error conditions Premature end of script headers warn Warning conditions child process 1234 did not exit sending another SIGHUP notice Normal but significant condition httpd caught SIGBUS attempting to dump core in info Informational Server seems busy you may need to increase StartServers or Min MaxSpareServers debug Debug level messages Opening config file When a particular level is specified messages from all other levels of higher significance will be reported as well E g when LogLevel info is specified then messages with log levels of notice and warn will also be posted Using a level of at least crit is recommended For example LogLevel notice Note When logging to a regular file messages of the level notice cannot be suppressed and thus are always logged However this doesn t apply when logging is done using syslog MaxKeepAliveRequests Directive Description Number of requests allowed on a persistent connection Syntax MaxKeepAliveRequests number Default MaxKeepAliveRequests 100 Context server config virtual host Status Core Module core The MaxKeepAliveRequests directive limits the number of requests allowed per connection when KeepAlive is on If it is set to 0 unlimited requests will be allowed We recommend that this setting be kept to a high value for maximum server performance For example MaxKeepAliveRequests 500 NameVirtualHost Directive Description Designates an IP address for name virtual hosting Syntax NameVirtualHost addr port Context server config Status Core Module core The NameVirtualHost directive is a required directive if you want to configure name based virtual hosts Although addr can be hostname it is recommended that you always use an IP address e g NameVirtualHost 111 22 33 44 With the NameVirtualHost directive you specify the IP address on which the server will receive requests for the name based virtual hosts This will usually be the address to which your name based virtual host names resolve In cases where a firewall or other proxy receives the requests and forwards them on a different IP address to the server you must specify the IP address of the physical interface on the machine which will be servicing the requests If you have multiple name based hosts on multiple addresses repeat the directive for each address Note Note that the main server and any default servers will never be served for a request to a NameVirtualHost IP address unless for some reason you specify NameVirtualHost but then don t define any VirtualHost s for that address Optionally you can specify a port number on which the name based virtual hosts should be used e g NameVirtualHost 111 22 33 44 8080 IPv6 addresses must be enclosed in square brackets as shown in the following example NameVirtualHost 2001 db8 a00 20ff fea7 ccea 8080 To receive requests on all interfaces you can use an argument of NameVirtualHost Argument to VirtualHost directive Note that the argument to the VirtualHost directive must exactly match the argument to the NameVirtualHost directive NameVirtualHost 1 2 3 4 VirtualHost 1 2 3 4 VirtualHost See also Virtual Hosts documentation Options Directive Description Configures what features are available in a particular directory Syntax Options option option Default Options All Context server config virtual host directory htaccess Override Options Status Core Module core The Options directive controls which server features are available in a particular directory option can be set to None in which case none of the extra features are enabled or one or more of the following All All options except for MultiViews This is the default setting ExecCGI Execution of CGI scripts using mod cgi is permitted FollowSymLinks The server will follow symbolic links in this directory Even though the server follows the symlink it does not change the pathname used to match against Directory sections Note also that this option gets ignored if set inside a Location section Includes Server side includes provided by mod include are permitted IncludesNOEXEC Server side includes are permitted but the exec cmd and exec cgi are disabled It is still possible to include virtual CGI scripts from ScriptAlias ed directories Indexes If a URL which maps to a directory is requested and there is no DirectoryIndex e g index html in that directory then mod autoindex will return a formatted listing of the directory MultiViews Content negotiated MultiViews are allowed using mod negotiation SymLinksIfOwnerMatch The server will only follow symbolic links for which the target file or directory is owned by the same user id as the link Note This option gets ignored if set inside a Location section Normally if multiple Options could apply to a directory then the most specific one is used and others are ignored the options are not merged See how sections are merged However if all the options on the Options directive are preceded by a or symbol the options are merged Any options preceded by a are added to the options currently in force and any options preceded by a are removed from the options currently in force For example without any and symbols Directory web docs Options Indexes FollowSymLinks Directory Directory web docs spec Options Includes Directory then only Includes will be set for the web docs spec directory However if the second Options directive uses the and symbols Directory web docs Options Indexes FollowSymLinks Directory Directory web docs spec Options Includes Indexes Directory then the options FollowSymLinks and Includes are set for the web docs spec directory Note Using IncludesNOEXEC or Includes disables server side includes completely regardless of the previous setting The default in the absence of any other settings is All Require Directive Description Selects which authenticated users can access a resource Syntax Require entity name entity name Context directory htaccess Override AuthConfig Status Core Module core This directive selects which authenticated users can access a resource The restrictions are processed by authorization modules Some of the allowed syntaxes provided by mod authz user and mod authz groupfile are Require user userid userid Only the named users can access the resource Require group group name group name Only users in the named groups can access the resource Require valid user All valid users can access the resource Other authorization modules that implement require options include mod authnz ldap mod authz dbm and mod authz owner Require must be accompanied by AuthName and AuthType directives and directives such as AuthUserFile and AuthGroupFile to define users and groups in order to work correctly Example AuthType Basic AuthName Restricted Resource AuthUserFile web users AuthGroupFile web groups Require group admin Access controls which are applied in this way are effective for all methods This is what is normally desired If you wish to apply access controls only to specific methods while leaving other methods unprotected then place the Require statement into a Limit section If Require is used together with the Allow or Deny directives then the interaction of these restrictions is controlled by the Satisfy directive Removing controls in subdirectories The following example shows how to use the Satisfy directive to disable access controls in a subdirectory of a protected directory This technique should be used with caution because it will also disable any access controls imposed by mod authz host Directory path to protected Require user david Directory Directory path to protected unprotected All access controls and authentication are disabled in this directory Satisfy Any Allow from all Directory See also Authentication Authorization and Access Control Satisfy mod authz host RLimitCPU Directive Description Limits the CPU consumption of processes launched by Apache children Syntax RLimitCPU seconds max seconds max Default Unset uses operating system defaults Context server config virtual host directory htaccess Override All Status Core Module core Takes 1 or 2 parameters The first parameter sets the soft resource limit for all processes and the second parameter sets the maximum resource limit Either parameter can be a number or max to indicate to the server that the limit should be set to the maximum allowed by the operating system configuration Raising the maximum resource limit requires that the server is running as root or in the initial startup phase This applies to processes forked off from Apache children servicing requests not the Apache children themselves This includes CGI scripts and SSI exec commands but not any processes forked off from the Apache parent such as piped logs CPU resource limits are expressed in seconds

    Original URL path: http://bc.capitalsafety.com/manual/mod/core.html (2016-02-16)
    Open archived version from archive

  • Apache HTTP Server Version 2.2 Documentation - Apache HTTP Server
    Restarting Run time Configuration Directives Directive Quick Reference Modules Multi Processing Modules MPMs Filters Handlers Server and Supporting Programs Glossary Users Guide Binding Configuration Files Configuration Sections Content Caching Content Negotiation Dynamic Shared Objects DSO Environment Variables Log Files Mapping URLs to the Filesystem Performance Tuning Security Tips Server Wide Configuration SSL TLS Encryption Suexec Execution for CGI URL Rewriting Guide Virtual Hosts How To Tutorials Authentication Authorization and Access

    Original URL path: http://bc.capitalsafety.com/manual/index.html (2016-02-16)
    Open archived version from archive

  • Module Index - Apache HTTP Server
    Authorization fallback module mod authz groupfile Group authorization using plaintext files mod authz host Group authorizations based on host name or IP address mod authz owner Authorization based on file ownership mod authz user User Authorization mod autoindex Generates directory indexes automatically similar to the Unix ls command or the Win32 dir shell command mod cache Content cache keyed to URIs mod cern meta CERN httpd metafile semantics mod cgi Execution of CGI scripts mod cgid Execution of CGI scripts using an external CGI daemon mod charset lite Specify character set translation or recoding mod dav Distributed Authoring and Versioning WebDAV functionality mod dav fs filesystem provider for mod dav mod dav lock generic locking module for mod dav mod dbd Manages SQL database connections mod deflate Compress content before it is delivered to the client mod dir Provides for trailing slash redirects and serving directory index files mod disk cache Content cache storage manager keyed to URIs mod dumpio Dumps all I O to error log as desired mod echo A simple echo server to illustrate protocol modules mod env Modifies the environment which is passed to CGI scripts and SSI pages mod example Illustrates the Apache module API mod expires Generation of Expires and Cache Control HTTP headers according to user specified criteria mod ext filter Pass the response body through an external program before delivery to the client mod file cache Caches a static list of files in memory mod filter Context sensitive smart filter configuration module mod headers Customization of HTTP request and response headers mod ident RFC 1413 ident lookups mod imagemap Server side imagemap processing mod include Server parsed html documents Server Side Includes mod info Provides a comprehensive overview of the server configuration mod isapi ISAPI Extensions within Apache for Windows mod ldap

    Original URL path: http://bc.capitalsafety.com/manual/mod/ (2016-02-16)
    Open archived version from archive

  • Directive Index - Apache HTTP Server
    AddAlt AddAltByEncoding AddAltByType AddCharset AddDefaultCharset AddDescription AddEncoding AddHandler AddIcon AddIconByEncoding AddIconByType AddInputFilter AddLanguage AddModuleInfo AddOutputFilter AddOutputFilterByType AddType Alias AliasMatch Allow AllowCONNECT AllowEncodedSlashes AllowOverride Anonymous Anonymous LogEmail Anonymous MustGiveEmail Anonymous NoUserID Anonymous VerifyEmail AuthBasicAuthoritative AuthBasicProvider AuthDBDUserPWQuery AuthDBDUserRealmQuery AuthDBMGroupFile AuthDBMType AuthDBMUserFile AuthDefaultAuthoritative AuthDigestAlgorithm AuthDigestDomain AuthDigestNcCheck AuthDigestNonceFormat AuthDigestNonceLifetime AuthDigestProvider AuthDigestQop AuthDigestShmemSize AuthGroupFile AuthLDAPBindDN AuthLDAPBindPassword AuthLDAPCharsetConfig AuthLDAPCompareDNOnServer AuthLDAPDereferenceAliases AuthLDAPGroupAttribute AuthLDAPGroupAttributeIsDN AuthLDAPRemoteUserIsDN AuthLDAPUrl AuthName AuthnProviderAlias AuthType AuthUserFile AuthzDBMAuthoritative AuthzDBMType AuthzDefaultAuthoritative AuthzGroupFileAuthoritative AuthzLDAPAuthoritative AuthzOwnerAuthoritative AuthzUserAuthoritative BrowserMatch BrowserMatchNoCase BufferedLogs CacheDefaultExpire CacheDirLength CacheDirLevels CacheDisable CacheEnable CacheFile CacheIgnoreCacheControl CacheIgnoreHeaders CacheIgnoreNoLastMod CacheLastModifiedFactor CacheMaxExpire CacheMaxFileSize CacheMinFileSize CacheNegotiatedDocs CacheRoot CacheStoreNoStore CacheStorePrivate CGIMapExtension CharsetDefault CharsetOptions CharsetSourceEnc CheckSpelling ContentDigest CookieDomain CookieExpires CookieLog CookieName CookieStyle CookieTracking CoreDumpDirectory CustomLog Dav DavDepthInfinity DavGenericLockDB DavLockDB DavMinTimeout DBDExptime DBDKeep DBDMax DBDMin DBDParams DBDPersist DBDPrepareSQL DBDriver DefaultIcon DefaultLanguage DefaultType DeflateBufferSize DeflateCompressionLevel DeflateFilterNote DeflateMemLevel DeflateWindowSize Deny Directory DirectoryIndex DirectoryMatch DirectorySlash DocumentRoot DumpIOInput DumpIOOutput EnableExceptionHook EnableMMAP EnableSendfile ErrorDocument ErrorLog Example ExpiresActive ExpiresByType ExpiresDefault ExtendedStatus ExtFilterDefine ExtFilterOptions FileETag Files FilesMatch FilterChain FilterDeclare FilterProtocol FilterProvider FilterTrace ForceLanguagePriority ForceType ForensicLog GracefulShutdownTimeout Group Header HeaderName HostnameLookups IdentityCheck IdentityCheckTimeout IfDefine IfModule IfVersion ImapBase ImapDefault ImapMenu Include IndexIgnore IndexOptions IndexOrderDefault IndexStyleSheet ISAPIAppendLogToErrors ISAPIAppendLogToQuery ISAPICacheFile ISAPIFakeAsync ISAPILogNotSupported ISAPIReadAheadBuffer KeepAlive KeepAliveTimeout LanguagePriority LDAPCacheEntries LDAPCacheTTL LDAPConnectionTimeout LDAPOpCacheEntries LDAPOpCacheTTL LDAPSharedCacheFile LDAPSharedCacheSize LDAPTrustedClientCert LDAPTrustedGlobalCert LDAPTrustedMode LDAPVerifyServerCert Limit LimitExcept LimitInternalRecursion LimitRequestBody LimitRequestFields LimitRequestFieldSize LimitRequestLine LimitXMLRequestBody Listen ListenBackLog LoadFile LoadModule Location LocationMatch LockFile LogFormat LogLevel MaxClients MaxKeepAliveRequests MaxMemFree MaxRequestsPerChild MaxRequestsPerThread MaxSpareServers MaxSpareThreads MaxThreads MCacheMaxObjectCount MCacheMaxObjectSize MCacheMaxStreamingBuffer MCacheMinObjectSize MCacheRemovalAlgorithm MCacheSize MetaDir MetaFiles MetaSuffix MimeMagicFile MinSpareServers MinSpareThreads MMapFile ModMimeUsePathInfo MultiviewsMatch NameVirtualHost NoProxy NWSSLTrustedCerts NWSSLUpgradeable Options Order PassEnv PidFile ProtocolEcho Proxy ProxyBadHeader ProxyBlock ProxyDomain ProxyErrorOverride ProxyIOBufferSize ProxyMatch ProxyMaxForwards ProxyPass ProxyPassReverse ProxyPassReverseCookieDomain ProxyPassReverseCookiePath ProxyPreserveHost ProxyReceiveBufferSize ProxyRemote ProxyRemoteMatch ProxyRequests ProxyTimeout ProxyVia ReadmeName ReceiveBufferSize Redirect RedirectMatch RedirectPermanent RedirectTemp RemoveCharset RemoveEncoding RemoveHandler RemoveInputFilter RemoveLanguage RemoveOutputFilter RemoveType RequestHeader Require RewriteBase RewriteCond RewriteEngine RewriteLock RewriteLog RewriteLogLevel RewriteMap RewriteOptions RewriteRule RLimitCPU RLimitMEM RLimitNPROC Satisfy ScoreBoardFile Script ScriptAlias ScriptAliasMatch ScriptInterpreterSource ScriptLog ScriptLogBuffer ScriptLogLength ScriptSock SecureListen SendBufferSize

    Original URL path: http://bc.capitalsafety.com/manual/mod/directives.html (2016-02-16)
    Open archived version from archive

  • Frequently Asked Questions - Apache HTTP Server
    Apache web site at http httpd apache org docs 2 2 faq In addition you can view this FAQ all in one page for easy searching and printing If you don t find the answer to your question in the below sections please also consult the Apache 1 3 FAQ to see if your question is answered there Topics Background Background information about the Apache HTTP Server Support What do

    Original URL path: http://bc.capitalsafety.com/manual/faq/ (2016-02-16)
    Open archived version from archive

  • Glossary - Apache HTTP Server
    example com is a domain name and www example com is a fully qualified domain name Handler An internal Apache representation of the action to be performed when a file is called Generally files have implicit handlers based on the file type Normally all files are simply served by the server but certain file types are handled separately For example the cgi script handler designates files to be processed as CGIs See Apache s Handler Use Hash A mathematical one way irreversable algorithm generating a string with fixed length from another string of any length Different input strings will usually produce different hashes depending on the hash function Header The part of the HTTP request and response that is sent before the actual content and that contains meta information describing the content htaccess A configuration file that is placed inside the web tree and applies configuration directives to the directory where it is placed and all sub directories Despite its name this file can hold almost any type of directive not just access control directives See Configuration Files httpd conf The main Apache configuration file The default location is usr local apache2 conf httpd conf but it may be moved using run time or compile time configuration See Configuration Files HyperText Transfer Protocol HTTP The standard transmission protocol used on the World Wide Web Apache implements version 1 1 of the protocol referred to as HTTP 1 1 and defined by RFC 2616 HTTPS The HyperText Transfer Protocol Secure the standard encrypted communication mechanism on the World Wide Web This is actually just HTTP over SSL See SSL TLS Encryption Method In the context of HTTP an action to perform on a resource specified on the request line by the client Some of the methods available in HTTP are GET POST and PUT Message Digest A hash of a message which can be used to verify that the contents of the message have not been altered in transit See SSL TLS Encryption MIME type A way to describe the kind of document being transmitted Its name comes from that fact that its format is borrowed from the Multipurpose Internet Mail Extensions It consists of a major type and a minor type separated by a slash Some examples are text html image gif and application octet stream In HTTP the MIME type is transmitted in the Content Type header See mod mime Module An independent part of a program Much of Apache s functionality is contained in modules that you can choose to include or exclude Modules that are compiled into the Apache httpd binary are called static modules while modules that are stored separately and can be optionally loaded at run time are called dynamic modules or DSOs Modules that are included by default are called base modules Many modules are available for Apache that are not distributed as part of the Apache HTTP Server tarball These are referred to as third party modules See Module Index Module Magic Number

    Original URL path: http://bc.capitalsafety.com/manual/glossary.html (2016-02-16)
    Open archived version from archive

  • Sitemap - Apache HTTP Server
    Encryption FAQ Guides Tutorials and HowTos Overview Authentication Dynamic Content with CGI Introduction to Server Side Includes htaccess files Per user web directories Platform specific Notes Overview Using Apache with Microsoft Windows Compiling Apache for Microsoft Windows Using Apache with Novell NetWare Running a High Performance Web Server on HPUX The Apache EBCDIC Port Apache HTTP Server and Supporting Programs Overview Manual Page httpd Manual Page ab Manual Page apachectl Manual Page apxs Manual Page configure Manual Page dbmmanage Manual Page htcacheclean Manual Page htdbm Manual Page htdigest Manual Page htpasswd Manual Page logresolve Manual Page rotatelogs Manual Page suexec Other Programs Apache Miscellaneous Documentation Overview Relevant Standards Apache modules Definitions of terms used to describe Apache modules Definitions of terms used to describe Apache directives Apache Core Features Apache MPM Common Directives Apache MPM beos Apache MPM event Apache MPM netware Apache MPM os2 Apache MPM prefork Apache MPM winnt Apache MPM worker Apache Module mod actions Apache Module mod alias Apache Module mod asis Apache Module mod auth basic Apache Module mod auth digest Apache Module mod authn alias Apache Module mod authn anon Apache Module mod authn dbd Apache Module mod authn dbm Apache Module mod authn default Apache Module mod authn file Apache Module mod authnz ldap Apache Module mod authz dbm Apache Module mod authz default Apache Module mod authz groupfile Apache Module mod authz host Apache Module mod authz owner Apache Module mod authz user Apache Module mod autoindex Apache Module mod cache Apache Module mod cern meta Apache Module mod cgi Apache Module mod cgid Apache Module mod charset lite Apache Module mod dav Apache Module mod dav fs Apache Module mod dav lock Apache Module mod dbd Apache Module mod deflate Apache Module mod dir Apache Module mod disk cache Apache Module

    Original URL path: http://bc.capitalsafety.com/manual/sitemap.html (2016-02-16)
    Open archived version from archive