From: Jim Jagielski Date: Thu, 8 Feb 2007 13:54:19 +0000 (+0000) Subject: Docs update. Sync with transforms X-Git-Tag: 2.3.0~1910 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=30621ddf30496ff0fffca2c35adf1a974996c967;p=thirdparty%2Fapache%2Fhttpd.git Docs update. Sync with transforms git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@504899 13f79535-47bb-0310-9956-ffa450edef68 --- diff --git a/docs/man/htdigest.1 b/docs/man/htdigest.1 index fd6598f889c..195ab89a94c 100644 --- a/docs/man/htdigest.1 +++ b/docs/man/htdigest.1 @@ -19,7 +19,7 @@ .el .ne 3 .IP "\\$1" \\$2 .. -.TH "HTDIGEST" 1 "2003-11-25" "Apache HTTP Server" "htdigest" +.TH "HTDIGEST" 1 "2007-02-08" "Apache HTTP Server" "htdigest" .SH NAME htdigest \- manage user files for digest authentication @@ -55,3 +55,8 @@ The realm name to which the user name belongs\&. \fIusername\fR The user name to create or update in \fIpasswdfile\fR\&. If \fIusername\fR does not exist is this file, an entry is added\&. If it does exist, the password is changed\&. +.SH "SECURITY CONSIDERATIONS" + +.PP +This program is not safe as a setuid executable\&. Do \fInot\fR make it setuid\&. + diff --git a/docs/man/htpasswd.1 b/docs/man/htpasswd.1 index b1f854163a1..f0a7ac476be 100644 --- a/docs/man/htpasswd.1 +++ b/docs/man/htpasswd.1 @@ -19,7 +19,7 @@ .el .ne 3 .IP "\\$1" \\$2 .. -.TH "HTPASSWD" 1 "2005-11-13" "Apache HTTP Server" "htpasswd" +.TH "HTPASSWD" 1 "2007-02-08" "Apache HTTP Server" "htpasswd" .SH NAME htpasswd \- Manage user files for basic authentication @@ -130,6 +130,9 @@ Encrypts the password from the command line (Pwd4Steve) using the MD5 algorithm, .PP Web password files such as those managed by htpasswd should \fInot\fR be within the Web server's URI space -- that is, they should not be fetchable with a browser\&. +.PP +This program is not safe as a setuid executable\&. Do \fInot\fR make it setuid\&. + .PP The use of the -b option is discouraged, since when it is used the unencrypted password appears on the command line\&. diff --git a/docs/manual/howto/auth.xml.meta b/docs/manual/howto/auth.xml.meta index ca40aa7f42e..7a87763842b 100644 --- a/docs/manual/howto/auth.xml.meta +++ b/docs/manual/howto/auth.xml.meta @@ -7,7 +7,7 @@ en - ja + ja ko diff --git a/docs/manual/mod/directives.html.en b/docs/manual/mod/directives.html.en index 2f495b210a5..fefe4989c73 100644 --- a/docs/manual/mod/directives.html.en +++ b/docs/manual/mod/directives.html.en @@ -124,6 +124,7 @@
  • CacheIgnoreCacheControl
  • CacheIgnoreHeaders
  • CacheIgnoreNoLastMod
  • +
  • CacheIgnoreQueryString
  • CacheLastModifiedFactor
  • CacheMaxExpire
  • CacheMaxFileSize
  • diff --git a/docs/manual/mod/mod_authnz_ldap.html.en b/docs/manual/mod/mod_authnz_ldap.html.en index ffdf4e9ac40..18c55c740d1 100644 --- a/docs/manual/mod/mod_authnz_ldap.html.en +++ b/docs/manual/mod/mod_authnz_ldap.html.en @@ -246,8 +246,14 @@ for HTTP Basic authentication.
  • otherwise, deny or decline access
  • -

    Other Require values may also be - used which may require loading additional authorization modules.

    +

    Other Require values may also + be used which may require loading additional authorization modules. + Note that if you use a Require + value from another authorization module, you will need to ensure that + AuthzLDAPAuthoritative + is set to off to allow the authorization phase to fall + back to the module providing the alternate + Require value.