From: Jeff Trawick
Date: Tue, 6 Sep 2005 15:49:21 +0000 (+0000)
Subject: Backport changes to LimitRequestFieldSize docs to reflect
X-Git-Tag: 2.0.55~57
X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=f603117d4dbaac0cf318debf62fba5902990d735;p=thirdparty%2Fapache%2Fhttpd.git
Backport changes to LimitRequestFieldSize docs to reflect
the lifting of a related restriction in 2.0.53. This
was a missed portion of that backport.
git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/branches/2.0.x@279024 13f79535-47bb-0310-9956-ffa450edef68
---
diff --git a/docs/manual/mod/core.html.en b/docs/manual/mod/core.html.en
index 85071070f8c..85747b2b855 100644
--- a/docs/manual/mod/core.html.en
+++ b/docs/manual/mod/core.html.en
@@ -1753,21 +1753,18 @@ client
Status: | Core |
Module: | core |
- This directive specifies the number of bytes from 0
- to the value of the compile-time constant
- DEFAULT_LIMIT_REQUEST_FIELDSIZE
(8190 as
- distributed) that will be allowed in an HTTP request
- header.
+ This directive specifies the number of bytes
+ that will be allowed in an HTTP request header.
The LimitRequestFieldSize
directive
- allows the server administrator to reduce the limit on the allowed
- size of an HTTP request header field below the normal input buffer
- size compiled with the server. A server needs this value to be
- large enough to hold any one header field from a normal client
- request. The size of a normal request header field will vary
- greatly among different client implementations, often depending
- upon the extent to which a user has configured their browser to
- support detailed content negotiation.
+ allows the server administrator to reduce or increase the limit
+ on the allowed size of an HTTP request header field. A server
+ needs this value to be large enough to hold any one header field
+ from a normal client request. The size of a normal request header
+ field will vary greatly among different client implementations,
+ often depending upon the extent to which a user has configured
+ their browser to support detailed content negotiation. SPNEGO
+ authentication headers can be up to 12392 bytes.
This directive gives the server administrator greater
control over abnormal client request behavior, which may be
@@ -1782,6 +1779,11 @@ client
Under normal conditions, the value should not be changed from
the default.
+ Apache 2.0.53 or higher is required for increasing the
+ limit above the compiled-in value of DEFAULT_LIMIT_REQUEST_FIELDSIZE
+ (8190 as distributed).
+
+
diff --git a/docs/manual/mod/core.xml b/docs/manual/mod/core.xml
index 134c8a84802..10d8a21f6c3 100644
--- a/docs/manual/mod/core.xml
+++ b/docs/manual/mod/core.xml
@@ -1718,21 +1718,18 @@ client
server config
- This directive specifies the number of bytes from 0
- to the value of the compile-time constant
- DEFAULT_LIMIT_REQUEST_FIELDSIZE
(8190 as
- distributed) that will be allowed in an HTTP request
- header.
+ This directive specifies the number of bytes
+ that will be allowed in an HTTP request header.
The LimitRequestFieldSize directive
- allows the server administrator to reduce the limit on the allowed
- size of an HTTP request header field below the normal input buffer
- size compiled with the server. A server needs this value to be
- large enough to hold any one header field from a normal client
- request. The size of a normal request header field will vary
- greatly among different client implementations, often depending
- upon the extent to which a user has configured their browser to
- support detailed content negotiation.
+ allows the server administrator to reduce or increase the limit
+ on the allowed size of an HTTP request header field. A server
+ needs this value to be large enough to hold any one header field
+ from a normal client request. The size of a normal request header
+ field will vary greatly among different client implementations,
+ often depending upon the extent to which a user has configured
+ their browser to support detailed content negotiation. SPNEGO
+ authentication headers can be up to 12392 bytes.
This directive gives the server administrator greater
control over abnormal client request behavior, which may be
@@ -1747,6 +1744,11 @@ client
Under normal conditions, the value should not be changed from
the default.
+ Apache 2.0.53 or higher is required for increasing the
+ limit above the compiled-in value of DEFAULT_LIMIT_REQUEST_FIELDSIZE
+ (8190 as distributed).
+
+