From: Ruediger Pluem
For modules that don't implement any merging logic, such as
- mod_access_compat, the behavior in later sections
+ mod_access_compat, the behavior in later sections
depends on whether the later section has any directives
from the module. The configuration is inherited until a change is made,
at which point the configuration is replaced and not merged.
Le daremos algunas pistas y consejos sobre problemas de seguridad al configurar un servidor web. Algunas de las sugerencias serán genéricas, otras especÃficas de Apache.
diff --git a/docs/manual/mod/core.html.de b/docs/manual/mod/core.html.de index ecce09a3144..fe632aa7964 100644 --- a/docs/manual/mod/core.html.de +++ b/docs/manual/mod/core.html.de @@ -1227,7 +1227,7 @@ sich im Apache 2.0 geObwohl die meisten Fehlermeldungen überschrieben werden
können, werden unter bestimmten Umständen die internen
- Meldungen ungeachtet der Einstellung der ErrorDocument-Direktive verwendet. Insbesondere bei
+ Meldungen ungeachtet der Einstellung der ErrorDocument-Direktive verwendet. Insbesondere bei
einer fehlerhaften Anfrage werden der normale Bearbeitungsprozess sofort
beendet und die interne Meldung zurückgegeben. Das ist notwendig, um
Sicherheitsprobleme zu vermeiden, die auf Grund fehlerhafter Anfragen
@@ -1972,7 +1972,7 @@ bestimmte HTTP-Methoden
<LimitExcept>-Container sollte immer einem <Limit>-Container vorgezogen
+ ein <LimitExcept>-Container sollte immer einem <Limit>-Container vorgezogen
werden, da <LimitExcept>
einen Schutz gegen beliebige Methoden bietet.
| Beschreibung: | Controls whether the REDIRECT_URL environment variable is fully qualified |
|---|---|
| Syntax: | QualifyRedirectURL ON|OFF |
| Voreinstellung: | QualifyRedirectURL OFF |
| Syntax: | QualifyRedirectURL On|Off |
| Voreinstellung: | QualifyRedirectURL Off |
| Kontext: | Serverkonfiguration, Virtual Host, Verzeichnis |
| AllowOverride: | FileInfo |
| Status: | Core |
| Modul: | core |
| Kompatibilität: | Directive supported in 2.4.18 and later. 2.4.17 acted -as if 'QualifyRedirectURL ON' was configured. |
Die Dokumentation zu dieser Direktive wurde noch nicht übersetzt. Bitte schauen Sie in die englische Version.
diff --git a/docs/manual/mod/core.html.en b/docs/manual/mod/core.html.en index b1366db21d1..38cbe3bf67d 100644 --- a/docs/manual/mod/core.html.en +++ b/docs/manual/mod/core.html.en @@ -1493,7 +1493,7 @@ ErrorDocument 403 /errors/forbidden.py?referrer=%{escape:%{HTTP_REFERER}}Although most error messages can be overridden, there are certain
circumstances where the internal messages are used regardless of the
- setting of ErrorDocument. In
+ setting of ErrorDocument. In
particular, if a malformed request is detected, normal request processing
will be immediately halted and the internal error message returned.
This is necessary to guard against security problems caused by
@@ -2559,7 +2559,7 @@ wildcard matching available in 2.3.6 and later
wildcard syntax shown below, to include files that match a particular
pattern, such as *.conf, for example.
The Include directive will
+
The Include directive will
fail with an error if a wildcard expression does not
match any file. The IncludeOptional
directive can be used if non-matching wildcards should be ignored.
/home///foo is the same as
/home/foo). In URL-space this is not necessarily true.
- The <LocationMatch>
+ The <LocationMatch>
directive and the regex version of <Location> require you to explicitly specify multiple
slashes if that is your intention.
@@ -3955,7 +3955,7 @@ directory
change the pathname used to match against <Directory> sections.
The FollowSymLinks and
- SymLinksIfOwnerMatch Options work only in <Directory> sections or
+ SymLinksIfOwnerMatch Options work only in <Directory> sections or
.htaccess files.
Omitting this option should not be considered a security restriction, @@ -4007,7 +4007,7 @@ directory
The FollowSymLinks and
- SymLinksIfOwnerMatch Options work only in <Directory> sections or
+ SymLinksIfOwnerMatch Options work only in <Directory> sections or
.htaccess files.
This option should not be considered a security restriction, @@ -4183,19 +4183,19 @@ directory
| Description: | Controls whether the REDIRECT_URL environment variable is fully qualified |
|---|---|
| Syntax: | QualifyRedirectURL ON|OFF |
| Default: | QualifyRedirectURL OFF |
| Syntax: | QualifyRedirectURL On|Off |
| Default: | QualifyRedirectURL Off |
| Context: | server config, virtual host, directory |
| Override: | FileInfo |
| Status: | Core |
| Module: | core |
| Compatibility: | Directive supported in 2.4.18 and later. 2.4.17 acted -as if 'QualifyRedirectURL ON' was configured. |
This directive controls whether the server will ensure that the
REDIRECT_URL environment variable is fully qualified. By default,
the variable contains the verbatim URL requested by the client,
- such as "/index.html". With QualifyRedirectURL ON, the same request would result in a
+ such as "/index.html". With QualifyRedirectURL On, the same request would result in a
value such as "http://www.example.com/index.html".
Even without this directive set, when a request is issued against a fully qualified URL, REDIRECT_URL will remain fully qualified. @@ -4236,17 +4236,26 @@ as if 'QualifyRedirectURL ON' was configured.
DOLLAR_ENDONLY# Add the ICASE option for all regexes by default +# Reset all default/defined options +RegexDefaultOptions none +# Add the ICASE option for all regexes by default RegexDefaultOptions +ICASE ... +# Add the ICASE option to the already applicable ones +RegexDefaultOptions +ICASE # Remove the default DOLLAR_ENDONLY option, but keep any other one RegexDefaultOptions -DOLLAR_ENDONLY ... # Set the DOTALL option only, resetting any other one RegexDefaultOptions DOTALL ... -# Reset all defined options -RegexDefaultOptions none +# Set the DOTALL and ICASE options only +# Options are applied in order and blindly, so: +# RegexDefaultOptions DOTALL ICASE +# would not work as possibly expected (ICASE clears DOTALL) +RegexDefaultOptions none +DOTALL +ICASE +# or "simply" +RegexDefaultOptions DOTALL +ICASE ...@@ -4439,8 +4448,8 @@ scripts so.
The option Registry-Strict which is new in Apache HTTP Server
- 2.0 does the same thing as Registry but uses only the
+
The option Registry-Strict
+ does the same thing as Registry but uses only the
subkey Shell\ExecCGI\Command. The
ExecCGI key is not a common one. It must be
configured manually in the windows registry and hence prevents
@@ -4537,7 +4546,7 @@ to name-virtual hosts
Name-based virtual hosts for the best-matching set of <virtualhost>s are processed
- in the order they appear in the configuration. The first matching ServerName or ServerAlias is used, with no different precedence for wildcards
+ in the order they appear in the configuration. The first matching ServerName or ServerAlias is used, with no different precedence for wildcards
(nor for ServerName vs. ServerAlias).
The complete list of names in the <VirtualHost>
@@ -4718,15 +4727,14 @@ is accessed by an incompatible browser
actually produced a returned error message.
The Off
- setting, which is the default, suppresses the footer line (and is
- therefore compatible with the behavior of Apache-1.2 and
- below). The On setting simply adds a line with the
+ setting, which is the default, suppresses the footer line.
+ The On setting simply adds a line with the
server version number and ServerName of the serving virtual host,
and the EMail setting additionally creates a
"mailto:" reference to the ServerAdmin of the referenced
document.
After version 2.0.44, the details of the server version number +
The details of the server version number
presented are controlled by the ServerTokens directive.
This setting applies to the entire server, and cannot be enabled or disabled on a virtualhost-by-virtualhost basis.
-After version 2.0.44, this directive also controls the +
This directive also controls the
information presented by the ServerSignature directive.
ServerTokens to less than
diff --git a/docs/manual/mod/core.html.es.utf8 b/docs/manual/mod/core.html.es.utf8
index a221f0fe6db..6a603eba6fa 100644
--- a/docs/manual/mod/core.html.es.utf8
+++ b/docs/manual/mod/core.html.es.utf8
@@ -1244,7 +1244,7 @@ in case of an error
Although most error messages can be overriden, there are certain
circumstances where the internal messages are used regardless of the
- setting of ErrorDocument. In
+ setting of ErrorDocument. In
particular, if a malformed request is detected, normal request processing
will be immediately halted and the internal error message returned.
This is necessary to guard against security problems caused by
@@ -2025,11 +2025,11 @@ wildcard matching available in 2.3.6 and later
When a wildcard is specified for a file component of
the path, and no file matches the wildcard, the
- Include
+ Include
directive will be silently ignored. When a wildcard is
specified for a directory component of the path, and
no directory matches the wildcard, the
- Include directive will
+ Include directive will
fail with an error saying the directory cannot be found.
When a directory or file component of the path is
specified exactly, and that directory or file does not exist,
- Include directive will fail with an
+ Include directive will fail with an
error saying the file or directory cannot be found.
The file path specified may be an absolute path, or may be relative @@ -3568,14 +3568,14 @@ On Windows from Apache 2.3.3 and later.
| Descripción: | Controls whether the REDIRECT_URL environment variable is fully qualified |
|---|---|
| Sintaxis: | QualifyRedirectURL ON|OFF |
| Valor por defecto: | QualifyRedirectURL OFF |
| Sintaxis: | QualifyRedirectURL On|Off |
| Valor por defecto: | QualifyRedirectURL Off |
| Contexto: | server config, virtual host, directory |
| Anula: | FileInfo |
| Estado: | Core |
| Módulo: | core |
| Compatibilidad: | Directive supported in 2.4.18 and later. 2.4.17 acted -as if 'QualifyRedirectURL ON' was configured. |
The documentation for this directive has not been translated yet. Please have a look at the English version.
ã»ã¨ãã©ã®ã¨ã©ã¼ã¡ãã»ã¼ã¸ã䏿¸ããããã¨ãã§ãã¾ãããç¹å®ã®ç¶æ³ä¸ã§ã¯
- ErrorDocument ã®è¨å®ã«ããããã
+ ErrorDocument ã®è¨å®ã«ããããã
å
èµã®ã¡ãã»ã¼ã¸ã使ããã¾ãã
ç¹ã«ã䏿£ãªå½¢å¼ã®ãªã¯ã¨ã¹ããæ¤åºãããå ´åãé常ã®ãªã¯ã¨ã¹ãå¦çã¯
å³åº§ã«ä¸æ¢ãããå
èµã®ã¨ã©ã¼ã¡ãã»ã¼ã¸ãè¿ããã¾ãã
@@ -1939,7 +1939,7 @@ the server configuration files
(<TraceEnable> åç
§)ã
<Limit>
+ <Limit>
ã»ã¯ã·ã§ã³ã®ä»£ããã« <LimitExcept> ã»ã¯ã·ã§ã³ã使ç¨ããæ¹ãè¯ãã§ãããã
<LimitExcept>
ã»ã¯ã·ã§ã³ã§ã¯ä¸ç¹å®ã®ã¡ã½ããã«å¯¾ãã¦ãé²å¾¡ã§ããããã§ãã| 説æ: | Controls whether the REDIRECT_URL environment variable is fully qualified |
|---|---|
| æ§æ: | QualifyRedirectURL ON|OFF |
| ããã©ã«ã: | QualifyRedirectURL OFF |
| æ§æ: | QualifyRedirectURL On|Off |
| ããã©ã«ã: | QualifyRedirectURL Off |
| ã³ã³ããã¹ã: | ãµã¼ãè¨å®ãã¡ã¤ã«, ãã¼ãã£ã«ãã¹ã, ãã£ã¬ã¯ã㪠|
| 䏿¸ã: | FileInfo |
| ã¹ãã¼ã¿ã¹: | Core |
| ã¢ã¸ã¥ã¼ã«: | core |
| äºææ§: | Directive supported in 2.4.18 and later. 2.4.17 acted -as if 'QualifyRedirectURL ON' was configured. |
ãã®ãã£ã¬ã¯ãã£ãã®è§£èª¬ææ¸ã¯ ã¾ã 翻訳ããã¦ãã¾ãããè±èªçãã覧ãã ããã
diff --git a/docs/manual/mod/core.html.tr.utf8 b/docs/manual/mod/core.html.tr.utf8 index e8a55f73171..0a2280b20ec 100644 --- a/docs/manual/mod/core.html.tr.utf8 +++ b/docs/manual/mod/core.html.tr.utf8 @@ -1428,7 +1428,7 @@ için iptal edilmiÅtir. bulabilirsiniz.ÃoÄu yerleÅik hata iletisi özel iletilerle deÄiÅtirilebilse de bazı
- durumlarda ErrorDocument ile ne
+ durumlarda ErrorDocument ile ne
belirtildiÄine bakılmaksızın yerleÅik hata iletileri kullanılır.
Ãzellikle, bozuk bir istek saptandıÄında normal istek iÅleme hemen
devre dıÅı bırakılır ve yerleÅik hata iletisi döndürülür. Bu, hatalı
@@ -2255,7 +2255,7 @@ presence or absence of a specific section directive
belli bir Åablona uyan dosyaları seçebilmek için, örneÄin *.conf gibi
dosya kalıplarının kullanılmasını öneriyoruz.
Include yönergesi, bir dosya
+
Include yönergesi, bir dosya
kalıbı ifadesi hiçbir dosyayla eÅleÅmezse bir hatayla
baÅarısız olacaktır. EÅleÅmeyen dosya kalıbı ifadelerinin
yoksayılması gerekiyorsa IncludeOptional yönergesi kullanılabilir.
Bu yönerge, diÄer yapılandırma dosyalarının sunucu yapılandırma
dosyasında içerilmesini saÄlar. ÃalıÅması Include yönergesi ile bir istisna dıÅında
aynıdır. Dosya kalıp karakterlerinin hiçbir dosya veya dizinle
- eÅleÅmemesi durumunda IncludeOptional yönergesi bir hataya sebep olmak yerine
+ eÅleÅmemesi durumunda IncludeOptional yönergesi bir hataya sebep olmak yerine
bunu sadece yoksayacaktır.
| Açıklama: | Controls whether the REDIRECT_URL environment variable is fully qualified |
|---|---|
| Sözdizimi: | QualifyRedirectURL ON|OFF |
| Ãntanımlı: | QualifyRedirectURL OFF |
| Sözdizimi: | QualifyRedirectURL On|Off |
| Ãntanımlı: | QualifyRedirectURL Off |
| BaÄlam: | sunucu geneli, sanal konak, dizin |
| GeçersizleÅtirme: | FileInfo |
| Durum: | Ãekirdek |
| Modül: | core |
| Uyumluluk: | Directive supported in 2.4.18 and later. 2.4.17 acted -as if 'QualifyRedirectURL ON' was configured. |
Bu yönergenin belgesi henüz Türkçeye çevrilmedi. Lütfen İngilizce sürümüne bakınız.
@@ -4028,7 +4028,7 @@ kullanılacak konak adları için baÅka isimler belirtebilmeyi saÄlar.İsme dayalı sanal konaklardan en iyi eÅleÅme kümesinde olanlar
yapılandırmada göründükleri sıraya göre iÅleme sokulur. Joker
- kullanımları arasında fark gözetilmeksizin ServerName veya ServerAlias yönergesi eÅleÅen ilk sanal konak
+ kullanımları arasında fark gözetilmeksizin ServerName veya ServerAlias yönergesi eÅleÅen ilk sanal konak
kullanılır.
Deny directives,
controls a three-pass access control system. The first pass
processes either all Allow or all Deny directives, as specified
- by the Order
+ by the Order
directive. The second pass parses the rest of the directives
(Deny or
Allow). The third
diff --git a/docs/manual/mod/mod_access_compat.html.es.utf8 b/docs/manual/mod/mod_access_compat.html.es.utf8
index 26a7ac72316..b70835d4a8f 100644
--- a/docs/manual/mod/mod_access_compat.html.es.utf8
+++ b/docs/manual/mod/mod_access_compat.html.es.utf8
@@ -209,7 +209,7 @@ Allow from 2001:db8::a00:20ff:fea7:ccea/10
Deny, realizan un sistema de control de tres fases. La primera fase proceso o bien todas las directivas
Allow o todas las directivas
Deny, tal y como se haya especificado en la directiva
- Order. La segunda fase interpreta el resto de directivas
+ Order. La segunda fase interpreta el resto de directivas
(Deny o
Allow). La tercera fase se aplica a todas las peticiones que no coinciden con cualquiera de las dos fases anteriores.
diff --git a/docs/manual/mod/mod_alias.html.en b/docs/manual/mod/mod_alias.html.en
index 4a2b5f99e31..368baee54ae 100644
--- a/docs/manual/mod/mod_alias.html.en
+++ b/docs/manual/mod/mod_alias.html.en
@@ -241,18 +241,18 @@ expressions
One subtle difference
between Alias
- and AliasMatch is
+ and AliasMatch is
that Alias will
automatically copy any additional part of the URI, past the part
that matched, onto the end of the file path on the right side,
- while AliasMatch will
+ while AliasMatch will
not. This means that in almost all cases, you will want the
regular expression to match the entire request URI from beginning
to end, and to use substitution on the right side.
In other words, just changing
Alias to
- AliasMatch will not
+ AliasMatch will not
have the same effect. At a minimum, you need to
add ^ to the beginning of the regular expression
and add (.*)$ to the end, and add $1 to
@@ -275,9 +275,9 @@ expressions
Of course, there's no point in
- using AliasMatch
+ using AliasMatch
where Alias would
- work. AliasMatch lets
+ work. AliasMatch lets
you do more complicated things. For example, you could
serve different kinds of files from different directories:
AliasMatch
also apply to the difference between
Redirect and
- RedirectMatch.
+ RedirectMatch.
See AliasMatch for
details.
@@ -619,7 +619,7 @@ and designates the target as a CGI script
AliasMatch
also apply to the difference between
ScriptAlias and
- ScriptAliasMatch.
+ ScriptAliasMatch.
See AliasMatch for
details.
diff --git a/docs/manual/mod/mod_alias.html.es.utf8 b/docs/manual/mod/mod_alias.html.es.utf8
index ab728e82904..53e74b0b495 100644
--- a/docs/manual/mod/mod_alias.html.es.utf8
+++ b/docs/manual/mod/mod_alias.html.es.utf8
@@ -216,13 +216,13 @@ Alias "/foo" "/gaq"
Una sutil diferencia entre
Alias
- y AliasMatch es que
+ y AliasMatch es que
Alias copiará automáticamente cualquier parte adicional de la URI, pasada la parte que coincide, al final de la ruta del fichero en el parámetro de la derecha, mientras que
- AliasMatch no lo hará. Esto significa en casi todos los casos, querrá que las expresiones regulares concuerden con la URI solicitada al completo desde el comienzo al final, y usar la sustitución del parámetro a la derecha.
AliasMatch no lo hará. Esto significa en casi todos los casos, querrá que las expresiones regulares concuerden con la URI solicitada al completo desde el comienzo al final, y usar la sustitución del parámetro a la derecha.
En otras palabras, cambiar
Alias a
- AliasMatch no tendrá el mismo resultado. Como mÃnimo, tendrá que añadir un ^ al comienzo de la expresión regular, añadir un (.*)$ al final y añadir
+ AliasMatch no tendrá el mismo resultado. Como mÃnimo, tendrá que añadir un ^ al comienzo de la expresión regular, añadir un (.*)$ al final y añadir
$1 al final del reemplazo.
Por ejemplo, supongamos que quiere reemplazar esto con AliasMatch:
@@ -241,9 +241,9 @@ Alias "/foo" "/gaq"Por supuesto, no hay ningún motivo para usar
- AliasMatch
+ AliasMatch
donde Alias funcionarÃa.
- AliasMatch le permite hacer cosas más complicadas. Por ejemplo, puede servir diferentes tipos de ficheros desde diferentes directorios:
AliasMatch le permite hacer cosas más complicadas. Por ejemplo, puede servir diferentes tipos de ficheros desde diferentes directorios:
AliasMatch "^/image/(.*)\.jpg$" "/files/jpg.images/$1.jpg" AliasMatch "^/image/(.*)\.gif$" "/files/gif.images/$1.gif"@@ -379,7 +379,7 @@ Redirect 303 "/three" "http://example.com/other"
AliasMatch
también aplican a las diferencias entre
Redirect y
- RedirectMatch.
+ RedirectMatch.
Vea AliasMatch para más
detalles.
@@ -529,7 +529,7 @@ una expresión regular y designa el destino como un script CGI
AliasMatch
también aplican a las diferencias entre
ScriptAlias y
- ScriptAliasMatch.
+ ScriptAliasMatch.
Vea AliasMatch para más
detalles.
diff --git a/docs/manual/mod/mod_alias.html.tr.utf8 b/docs/manual/mod/mod_alias.html.tr.utf8
index fbb98a3fd2d..00a7e83963b 100644
--- a/docs/manual/mod/mod_alias.html.tr.utf8
+++ b/docs/manual/mod/mod_alias.html.tr.utf8
@@ -208,16 +208,16 @@ eÅler.
Alias
- ve AliasMatch yönergeleri
+ ve AliasMatch yönergeleri
arasındaki baÅlıca fark Alias
yönergesinin, URI'nin ek parçasını, eÅleÅen parçayı geçip saÄ tarafta
- dosya yolunun ucuna kendiliÄinden kopyalamasıdır. AliasMatch bunu böyle yapmaz. Yani hemen
+ dosya yolunun ucuna kendiliÄinden kopyalamasıdır. AliasMatch bunu böyle yapmaz. Yani hemen
her durumda, düzenli ifadenin istenen URI'nin tamamıyla baÅtan sona
eÅleÅmesi ve yer deÄiÅtirmeyi saÄ tarafta yapması istenir.
BaÅka bir deyiÅle, basitçe
Alias yerine
- AliasMatch yazmakla aynı etkiyi
+ AliasMatch yazmakla aynı etkiyi
alamazsınız. En azından düzenli ifadenin baÅına bir ^ ve
sonuna bir (.*)$, ikinci deÄiÅtirgenin sonuna da bir
$1 eklemeniz gerekir.
Åüphesiz, Alias yönergesini
- çalıÅtıÄı yerde AliasMatch
- kullanmanın hiç gereÄi yoktur. AliasMatch daha karmaÅık Åeyler yapmamızı saÄlar. ÃrneÄin
+ çalıÅtıÄı yerde AliasMatch
+ kullanmanın hiç gereÄi yoktur. AliasMatch daha karmaÅık Åeyler yapmamızı saÄlar. ÃrneÄin
farklı dosya çeÅitlerini farklı dizinlerden sunmak isteyelim:
@@ -376,7 +376,7 @@ yönlendirme gönderir.
Alias ve
AliasMatch arasındaki farklarla
ilgili hususlar Redirect ve
- RedirectMatch arasındakilere de
+ RedirectMatch arasındakilere de
uygulanır. Ayrıntılar için AliasMatch yönergesine bakınız.Alias ve
AliasMatch arasındaki farklarla
ilgili hususlar ScriptAlias ve
- ScriptAliasMatch arasındakilere
+ ScriptAliasMatch arasındakilere
de uygulanır. Ayrıntılar için AliasMatch yönergesine bakınız.
A través del uso de
- AuthBasicUseDigestAlgorithm un sitio puede pasar de Autenticación Digest a Básica sin requerir que a los usuarios se les asignen contraseñas nuevas.
AuthBasicUseDigestAlgorithm un sitio puede pasar de Autenticación Digest a Básica sin requerir que a los usuarios se les asignen contraseñas nuevas.
Another option is to render the login form using a CGI script or other dynamic technology.
-AuthFormProvider file - ErrorDocument 401 "/cgi-bin/login.cgi" - ...+
AuthFormProvider file +ErrorDocument 401 "/cgi-bin/login.cgi" +...
| Description: | The name of a form field carrying the body of the request to attempt on successful login |
|---|---|
| Syntax: | AuthFormBody fieldname |
| Default: | httpd_body |
| Default: | AuthFormBody httpd_body |
| Context: | directory |
| Override: | AuthConfig |
| Status: | Base |
| Module: | mod_auth_form |
| Compatibility: | Available in Apache HTTP Server 2.3.0 and later |
The AuthFormMethod directive specifies
- the name of an HTML field which, if present, will contain the method of the request to
+
The AuthFormBody directive specifies
+ the name of an HTML field which, if present, will contain the body of the request
to submit should login be successful.
By populating the form with fields described by
AuthFormMethod,
AuthFormMimetype and
- AuthFormBody, a website can retry
+ AuthFormBody, a website can retry
a request that may have been interrupted by the login screen, or by a session
timeout.
| Description: | Disable the CacheControl no-store header on the login page |
|---|---|
| Syntax: | AuthFormDisableNoStore On|Off |
| Syntax: | AuthFormDisableNoStore On|Off |
| Default: | AuthFormDisableNoStore Off |
| Context: | directory |
| Override: | AuthConfig |
| Module: | mod_auth_form |
| Compatibility: | Available in Apache HTTP Server 2.3.0 and later |
The AuthFormDisableNoStore flag
+
The AuthFormDisableNoStore flag
disables the sending of a Cache-Control no-store header with the
error 401 page returned when the user is not yet logged in. The purpose of the header
is to make it difficult for an ecmascript application to attempt to resubmit the
@@ -423,7 +423,7 @@ lower level modules
| Description: | Fake a Basic Authentication header |
|---|---|
| Syntax: | AuthFormFakeBasicAuth On|Off |
| Syntax: | AuthFormFakeBasicAuth On|Off |
| Default: | AuthFormFakeBasicAuth Off |
| Context: | directory |
| Override: | AuthConfig |
| Module: | mod_auth_form |
| Compatibility: | Available in Apache HTTP Server 2.3.0 and later |
The AuthFormFakeBasicAuth flag
+
The AuthFormFakeBasicAuth flag
determines whether a Basic Authentication header will be added to
the request headers. This can be used to expose the username and password to
an underlying application, without the underlying application having to be aware
@@ -444,14 +444,14 @@ lower level modules
| Description: | The name of a form field carrying a URL to redirect to on successful login |
|---|---|
| Syntax: | AuthFormLocation fieldname |
| Default: | httpd_location |
| Default: | AuthFormLocation httpd_location |
| Context: | directory |
| Override: | AuthConfig |
| Status: | Base |
| Module: | mod_auth_form |
| Compatibility: | Available in Apache HTTP Server 2.3.0 and later |
The AuthFormLocation directive specifies
+
The AuthFormLocation directive specifies
the name of an HTML field which, if present, will contain a URL to redirect the browser to
should login be successful.
The AuthFormLoginRequiredLocation directive
+
The AuthFormLoginRequiredLocation directive
specifies the URL to redirect to should the user not be authorised to view a page. The value
is parsed using the ap_expr parser before being sent to the client.
By default, if a user is not authorised to view a page, the HTTP response code
@@ -494,7 +494,7 @@ parser has been added in 2.4.4.
The AuthFormLoginSuccessLocation directive
+
The AuthFormLoginSuccessLocation directive
specifies the URL to redirect to should the user have logged in successfully. The value is
parsed using the ap_expr parser before being sent to the client.
This directive can be overridden if a form field has been defined containing another URL
@@ -518,7 +518,7 @@ parser has been added in 2.4.4.
The AuthFormLogoutLocation directive
+
The AuthFormLogoutLocation directive
specifies the URL of a page on the server to redirect to should the user attempt to log
out. The value is parsed using the ap_expr parser before
being sent to the client.
| Description: | The name of a form field carrying the method of the request to attempt on successful login |
|---|---|
| Syntax: | AuthFormMethod fieldname |
| Default: | httpd_method |
| Default: | AuthFormMethod httpd_method |
| Context: | directory |
| Override: | AuthConfig |
| Status: | Base |
| Module: | mod_auth_form |
| Compatibility: | Available in Apache HTTP Server 2.3.0 and later |
The AuthFormMethod directive specifies
- the name of an HTML field which, if present, will contain the method of the request to
+
The AuthFormMethod directive specifies
+ the name of an HTML field which, if present, will contain the method of the request
to submit should login be successful.
By populating the form with fields described by
- AuthFormMethod,
+ AuthFormMethod,
AuthFormMimetype and
AuthFormBody, a website can retry
a request that may have been interrupted by the login screen, or by a session
@@ -570,20 +570,20 @@ parser has been added in 2.4.4.
| Description: | The name of a form field carrying the mimetype of the body of the request to attempt on successful login |
|---|---|
| Syntax: | AuthFormMimetype fieldname |
| Default: | httpd_mimetype |
| Default: | AuthFormMimetype httpd_mimetype |
| Context: | directory |
| Override: | AuthConfig |
| Status: | Base |
| Module: | mod_auth_form |
| Compatibility: | Available in Apache HTTP Server 2.3.0 and later |
The AuthFormMethod directive specifies
+
The AuthFormMimetype directive specifies
the name of an HTML field which, if present, will contain the
mimetype of the request to submit should login be successful.
By populating the form with fields described by
AuthFormMethod,
- AuthFormMimetype and
+ AuthFormMimetype and
AuthFormBody, a website can retry
a request that may have been interrupted by the login screen, or by a session
timeout.
| Description: | The name of a form field carrying the login password |
|---|---|
| Syntax: | AuthFormPassword fieldname |
| Default: | httpd_password |
| Default: | AuthFormPassword httpd_password |
| Context: | directory |
| Override: | AuthConfig |
| Status: | Base |
| Module: | mod_auth_form |
| Compatibility: | Available in Apache HTTP Server 2.3.0 and later |
The AuthFormPassword directive specifies
+
The AuthFormPassword directive specifies
the name of an HTML field which, if present, will contain the password to be used to log
in.
The AuthFormSitePassphrase directive
+
The AuthFormSitePassphrase directive
specifies a passphrase which, if present in the user session, causes Apache httpd to
bypass authentication checks for the given URL. It can be used on high traffic websites
to reduce the load induced on authentication infrastructure.
| Description: | The largest size of the form in bytes that will be parsed for the login details |
|---|---|
| Syntax: | AuthFormSize size |
| Default: | 8192 |
| Default: | AuthFormSize 8192 |
| Context: | directory |
| Status: | Base |
| Module: | mod_auth_form |
| Compatibility: | Available in Apache HTTP Server 2.3.0 and later |
The AuthFormSize directive specifies
+
The AuthFormSize directive specifies
the maximum size of the body of the request that will be parsed to find the login form.
If a login request arrives that exceeds this size, the whole request will be aborted @@ -704,14 +704,14 @@ parser has been added in 2.4.4.
| Description: | The name of a form field carrying the login username |
|---|---|
| Syntax: | AuthFormUsername fieldname |
| Default: | httpd_username |
| Default: | AuthFormUsername httpd_username |
| Context: | directory |
| Override: | AuthConfig |
| Status: | Base |
| Module: | mod_auth_form |
| Compatibility: | Available in Apache HTTP Server 2.3.0 and later |
The AuthFormUsername directive specifies
+
The AuthFormUsername directive specifies
the name of an HTML field which, if present, will contain the username to be used to log
in.
See above for examples of AuthLDAPURL URLs.
See above for examples of AuthLDAPURL URLs.
The BufferSize
+
The BufferSize
directive specifies the amount of data in bytes that will be
buffered before being read from or written to each request.
The default is 128 kilobytes.
CacheDirLevels*
- CacheDirLength ã®
+ CacheDirLength ã®
çµæã¯ 20 以å
ã§ãªããã°ãªãã¾ããã
CharsetSourceEnc
- and CharsetDefault disables translation. The charset
+ and CharsetDefault disables translation. The charset
need not match the charset of the response, but it must be a valid charset on the system.
CharsetSourceEnc
+ Specifying the same charset for both CharsetSourceEnc
and CharsetDefault disables translation. The charset
need not match the charset of the response, but it must be a valid charset on the system.
The CryptoDriver
+
The CryptoDriver
directive specifies the name of the crypto driver to use. There is usually
a recommended default driver on each platform. Possible values include
openssl, commoncrypto and
@@ -280,7 +280,7 @@
The CryptoSize
+
The CryptoSize
directive specifies the amount of data in bytes that will be
buffered before being encrypted or decrypted during each request.
The default is 128 kilobytes.
Last-Modified header will be respected if already
present in a response, and added to the response if the response is a
file and the header is missing. The
- SSILastModified directive
+ SSILastModified directive
takes precedence over XBitHack.The SSILastModified
directive takes precedence over the
- XBitHack directive when
+ XBitHack directive when
SSILastModified is set to
on.
This module manages common properties of domains for one or more virtual hosts. - Its main feature is the use of the ACME protocol - (RFC 8555) - to automate certificate provisioning. Certificates will be renewed - by the module ahead of their expiration to account for disruption in internet - services. There are ways to monitor the status of all Managed Domains - and configurations that will run your own notification commands on renewal, - expiration and errors. -
-- The default ACME Certificate Authority is + Its serves two main purposes: for one, supervise/renew https: certificates via the + ACME protocol (RFC 8555). + Certificates will be renewed by the module ahead of their expiration to account + for disruption in internet services. There are ways to monitor the status of all + certififcates managed this way and configurations that will run your own + notification commands on renewal, expiration and errors. +
+ Second, mod_md offers an alternate OCSP Stapling implementation. This works with + managed certificates as well as with certificates you configure yourself. OCSP + Stapling is a necessary component for any https: site, influencing page load + times and, depending on other setups, page availability. More in the + stapling section below. +
+ The default ACME Authority for managing certificates is Let's Encrypt, but it is possible to configure another CA that supports the protocol.
-This module is experimental. Its behaviors, directives, and - defaults are subject to more change from release to - release relative to other standard modules. Users are encouraged to - consult the "CHANGES" file for potential updates.
-Simple configuration example:
mod_watchdog to be loaded as well.
Certificate sign-up and renewal with Let's Encrypt requires your server to be - reachable on port 80 (http:) from the outside. The alternative method over - port 443 (https:) is currently disabled for security reasons (status from - 2018-01-14). + reachable on port 80 (http:) and/or port 443 (https:) from the public internet. + (Unless your server is configured to use DNS for challenges - more on that under + 'wildcard certificates')
- The module will select from the methods offered by Let's Encrypt. If LE decides - at one point in the future, to re-enable it again, mod_md will - use it when suitable. + The module will select from the methods offered by Let's Encrypt. Usually LE offers + challenges on both ports and DNS and Apache chooses a method available. +
+ To determine which one is available, the module looks at the ports
+ Apache httpd listens on. If those include port 80, it assumes that the
+ http: challenge (named http-01) is available. If the server listens
+ on port 443, the https: challenge (named tls-alpn-01) is also added to
+ the list. (And if MDChallengeDns01
+ is configured, the challenge dns-01 is added as well.)
+
+ If your setup is not so straight forward, there are two methods available
+ to influence this. First, look at MDPortMap
+ if the server is behind a portmapper, such as a firewall. Second, you may
+ override the module's guesswork completely by configuring
+ MDCAChallenges directly.
+
+ For domain verification via the TLS protocol `tls-alpn-01` is the name
+ of the challenge type. It requires the Apache server to listen on port 443
+ (see MDPortMap if you map that port
+ to something else).
- But for now, only the port 80 variant is available (termed "http-01"). Only - when LE can reach your server on port 80 will mod_md work for - you. For now, at least. + Let's Encrypt will open a TLS connection to Apache using the special indicator + `acme-tls/1` (this indication part of TLS is called ALPN, therefore the name + of the challenge. ALPN is also used by browsers to request a HTTP/2 connection).
- If you do not want to offer any sites on port 80 any more, you may leave it open
- and redirect all requests to your https: sites instead. Use the
- MDRequireHttps described below to do
- that in a convenient fashion. This will continue to answer http: challenges
- from Let's Encrypt.
+ As with the HTTP/2 protocol, to allow this, you configure:
Protocols h2 http/1.1 acme-tls/1+ +
+ And the `tls-alpn-01` challenge type is available. +
- Wildcard certificates are possible with version 2.x of `mod_md``. But they are - not straight-forward. Let's Encrypt requires the `dns-01` challenge verification + Wildcard certificates are possible, but not straight-forward to use out of + the box. Let's Encrypt requires the `dns-01` challenge verification for those. No other is considered good enough.
- The difficulty here is that Apache cannot do that on its own. (which is also - a security benefit, since corrupting a web server or the communication path to - it is the scenario `dns-01` protects against). As the name implies, `dns-01` + The difficulty here is that Apache cannot do that on its own. As the name implies, `dns-01` requires you to show some specific DNS records for your domain that contain some challenge data. So you need to _write_ your domain's DNS records.
- If you know how to do that, you can integrated this with `mod_md`. Let's + If you know how to do that, you can integrated this with mod_md. Let's say you have a script for that in `/usr/bin/acme-setup-dns` you configure Apache with:
@@ -220,6 +237,52 @@+ If you want to try the stapling in one Managed Domain alone at first, + configure: +
+<MDomain mydomain.net> + MDStapling on +</MDomain>+ +
+ and use the 'server-status' and/or MDMessageCmd to see how it operates. You will + see if Stapling information is there, how long it is valid, from where it came and + when it will be refreshed. +
+ If this all works to your satisfaction, you can switch it on for all your + certificates or just your managed ones. +
+ The existing stapling implementation by mod_ssl is used by many sites + for years. There are two main differences between the mod_ssl and mod_md + one: +
++ If you are unlucky and restart your server during an outage of your CA's + OCSP service, your users may no longer reach your sites. Without persistence + your server cannot provide the client with the data and the client browser + cannot get it as well, since the OCSP service is not responding. +
+ The implementation in mod_md will have peristed it, load it again after + restart and have it available for incoming connections. A day or two before + this information expires, it will renew it, making it able to copy with + a long OCSP service downtime. +
+ Due to backward compatibility, the existing implementation in mod_ssl could + not be changed drastically. For example, mod_ssl is unable to add a dependency + to mod_watchdog without braking many existing installations (that do not load it). +
+
MDCertificateAuthority
MDCertificateFile
MDCertificateKeyFile
MDCertificateMonitor
MDCertificateProtocol
MDCertificateStatus
MDChallengeDns01
MDRenewWindow
MDRequireHttps
MDServerStatus
MDStapleOthers
MDStapling
MDStaplingKeepResponse
MDStaplingRenewWindow
MDStoreDir
MDWarnWindow- Sets challenge types and their execution order when proving domain ownership. - The names are protocol specific. - The current ACME protocol version implemented by Let's Encrypt defines three challenge - types that are supported by mod_md. By default, it will try - the one on port 443 when available. + Sets challenge types (in order of preference) when proving domain ownership. + Supported by the module are the challenge methods 'tls-alpn-01', 'dns-01' + and 'http-01'. The module will look at the overall configuation of the server + to find out which methods can be used. +
+ If the server listens on port 80, for example, the 'http-01' method is available. + The prerequisite for 'dns-01' is a configured 'MDChallengeDns01' command. + 'tls-alpn-01' is described above in 'https: Challenges'. +
+ This auto selection works for most setups. But since Apache is a very powerful + server with many configuration options, the situation is not clear for all + possible cases. For example: it may listen on multiple IP addresses where some + are reachable on `https:` and some not. +
+ If you configure 'MDCAChallenges' directly, this auto selection is disabled. + Instead, the module will use the configured challenge list when talking to + the ACME server (a challenge type must be offered by the server as well). + This challenges are examined in the order specified.
MDRenewMode
'always' to it and the module will get a new certificate before
the one from the file expires. When it has done so, you remove the
- MDCertificateFile and reload the server.
+ MDCertificateFile and reload the server.
Another use case is that you renew your Let's Encrypt certificates with
another ACME clients, for example the excellent
@@ -396,6 +477,33 @@
SSLCertificateKeyFile directive.
| Description: | The URL of a certificate log monitor. |
|---|---|
| Syntax: | MDCertificateMonitor name url |
| Default: | crt.sh https://crt.sh?q= |
| Context: | server config |
| Status: | Experimental |
| Module: | mod_md |
+ This is part of the 'server-status' HTML user interface and has nothing to + do with the core functioning itself. It defines the link offered on that + page for easy checking of a certificate monitor. The SHA256 fingerprint + of the certificate is appended to the configured url. +
+ Certificate Monitors offer supervision of Certificate Transparency (CT) + Logs to track the use of certificates for domains. The least you may see + is that Let's Encrypt (or whichever CA you have configured) has entered + your certificates into the CTLogs. +
+ Caveat: certificate logs update and monitor's intakes of those + updates suffer some delay. This varies between logs and monitors. A + brand new certificate will not be known immediately. +
+
Instead of listing all dns names on the same line, you may use
- MDMember to add such names
+ MDMember to add such names
to a managed domain.
<MDomain example.org>
@@ -544,7 +652,7 @@
This command gets called when one of the following events happen for
- a Managed Domain: "renewed", "expiring", "errored". The command may
+ a Managed Domain: "renewed", "installed", "expiring", "errored". The command may
be invoked for more than these in the future and ignore events
it is not prepared to handle.
@@ -563,13 +671,25 @@ MDMessageCmd /etc/apache/md-message
return code other than 0 is regarded as an error.
'errored' is no immediate cause for concern since renewal is attempted
- early enough to allow the internet to come back.
+ early enough to allow the internet to come back. This is reported at most
+ once per hour.
'expiring' should be taken serious. It is issued when the
MDWarnWindow is reached. By default this is
10% of the certificate lifetime, so for Let's Encrypt this currently
means 9 days before it expires. The warning is repeated at most once
a day.
+
+ 'renewed' means that a new certificate has been obtained and is stored
+ in the 'staging' area in the MD store. It will be activated on the next
+ server restart/reload.
+
+ 'installed' is triggered when a new certificate has been transferred from
+ staging into the domains location in MD store. This happens at server
+ startup/reload. Different to all other invocations, MDMessageCmd is run
+ with root permissions (on *nix systems) and has access to the certificate
+ files (and keys). Certificates needed for other applications or
+ in different formats can be processed on this event.
| Description: | Enable stapling for certificates not managed by mod_md. |
|---|---|
| Syntax: | MDStapleOthers on|off |
| Default: | on |
| Context: | server config |
| Status: | Experimental |
| Module: | mod_md |
+ This setting only takes effect when `MDStapling` is enabled. It controls + if `mod_md` should also provide stapling information for certificates + that are not directly controlled by it, e.g. renewed via an ACME CA. +
+ +| Description: | Enable stapling for all or a particular MDomain. |
|---|---|
| Syntax: | MDStapling on|off |
| Default: | off |
| Context: | server config |
| Status: | Experimental |
| Module: | mod_md |
+ mod_md offers an implementation for providing OCSP stapling information. + This is an alternative to the one provided by 'mod_ssl'. For backward + compatiblity, this is disabled by default. +
+ The stapling can be switched on for all certificates on the server or + for an individual MDomain. This will replace any stapling configurtion + in `mod_ssl` for these hosts. When disabled, the 'mod_ssl' stapling + will do the work (if it is itself enabled, of course). This allows for + a gradual shift over from one implementation to the other. +
+ The stapling of `mod_md` will also work for domains where the certificates + are not managed by this module (see MDStapleOthers for how to control this). + This allows use of the new stapling without using any ACME certificate + management. +
+ +| Description: | Controls when old responses should be removed. |
|---|---|
| Syntax: | MDStaplingKeepResponse duration |
| Default: | 7d |
| Context: | server config |
| Status: | Experimental |
| Module: | mod_md |
+ This time window specifies when OCSP response data used in stapling + shall be removed from the store again. Response information older than + 7 days (default) is deleted on server restart/reload. This keeps the store + from growing when certificates are renewed/reconfigured frequently. +
+
+ +| Description: | Control when the stapling responses will be renewed. |
|---|---|
| Syntax: | MDStaplingRenewWindow duration |
| Default: | 33% |
| Context: | server config |
| Status: | Experimental |
| Module: | mod_md |
+ If the validity of the OCSP response used in stapling falls below 'duration', + mod_md will obtain a new OCSP response. +
+ The CA issueing a certificate commonly also operates the OCSP responder + service and determines how long its signed response about the validity + of a certificate are itself valid. The longer a response is valid, the longer + it can be cached which mean better overall performance for everyone. + The shorter the life time, the more rapidly certificate revocations + spread to clients. Also, service reliability is a consideration. +
+ By adjusting the stapling renew window you can control parts of this yourself. + If you make the renew time short (e.g. a short time before the current + information expires), you gain maximum cache time. But a service outage + (down for maintenance, for example) will affect you. If you renew a long + time before expiry, updates will be made more frequent, cause more load + on the CA server infrastructure and also more coordination between + the child processes of your server. +
+ The default is chosen as 33%, which means renewal is started when only + a third of the response lifetime is left. For a CA that issues OCSP + responses with lifetime of 3 days, this means 2 days of caching and 1 day + for renewal attempts. A service outage would have to last full 24 hours + to affect your domains. +
+ Setting an absolute renew window, like `2d` (2 days), is also possible. +
+Note that when defining a set of filters using the
- AddOutputFilter directive,
+ AddOutputFilter directive,
any definition made will replace any previous definition made by
- the AddOutputFilter
+ the AddOutputFilter
directive.
# Effective filter "DEFLATE" diff --git a/docs/manual/mod/mod_proxy.html.en b/docs/manual/mod/mod_proxy.html.en index d18deff624e..a1222ce3437 100644 --- a/docs/manual/mod/mod_proxy.html.en +++ b/docs/manual/mod/mod_proxy.html.en @@ -1148,17 +1148,17 @@ ProxyPass "/mirror/foo" "http://backend.example.com"guarantee any ordering or override.
The configured ProxyPass
+
The configured ProxyPass
and ProxyPassMatch
rules are checked in the order of configuration. The first rule that
matches wins. So usually you should sort conflicting
- ProxyPass rules starting with the
+ ProxyPass rules starting with the
longest URLs first. Otherwise, later rules for longer URLS will be hidden
by any earlier rule which uses a leading substring of the URL. Note that
there is some relation with worker sharing.
Only one ProxyPass directive
+
Only one ProxyPass directive
can be placed in a Location block,
and the most specific location will take precedence.
mod_proxy_connect enabled in the server.
Do not enable proxying with ProxyRequests until you have secured your server. Open proxy servers are dangerous
+
Do not enable proxying with ProxyRequests until you have secured your server. Open proxy servers are dangerous
both to your network and to the Internet at large.
ãµã¼ããå®å
¨ã«ããã¾ã§ ProxyRequests ã¯æå¹ã«ããªãã§ãã ããã
+
ãµã¼ããå®å
¨ã«ããã¾ã§ ProxyRequests ã¯æå¹ã«ããªãã§ãã ããã
ãªã¼ãã³ãããã·ãµã¼ãã¯ããªãèªèº«ã®ãããã¯ã¼ã¯ã«ã¨ã£ã¦ãã
ã¤ã³ã¿ã¼ãããå
¨ä½ã«ã¨ã£ã¦ãå±éºã§ãã
| Description: | UWSGI gateway module for mod_proxy |
|---|---|
| Status: | Extension |