From f497b8ffe2bc0ed838e5edc468725976f7a8a584 Mon Sep 17 00:00:00 2001 From: dgaudet Date: Fri, 27 Jun 1997 03:02:14 +0000 Subject: [PATCH] Merge in all of the docs from HEAD, I'll clean it up a bit later. Reviewed by: Submitted by: Obtained from: git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/branches/1.3@78394 13f79535-47bb-0310-9956-ffa450edef68 --- APACHE_1_2_X/htdocs/index.html | 56 ++-- APACHE_1_2_X/htdocs/manual/custom-error.html | 4 +- APACHE_1_2_X/htdocs/manual/index.html | 1 + APACHE_1_2_X/htdocs/manual/misc/FAQ.html | 204 +++++++++-- .../htdocs/manual/misc/compat_notes.html | 4 + .../htdocs/manual/misc/fin_wait_2.html | 114 +++---- APACHE_1_2_X/htdocs/manual/misc/index.html | 28 +- .../htdocs/manual/misc/known_bugs.html | 317 ++++-------------- APACHE_1_2_X/htdocs/manual/misc/nopgp.html | 4 +- .../htdocs/manual/misc/perf-bsd44.html | 2 +- APACHE_1_2_X/htdocs/manual/misc/perf.html | 14 +- APACHE_1_2_X/htdocs/manual/misc/vif-info.html | 264 +++++++-------- APACHE_1_2_X/htdocs/manual/mod/core.html | 5 +- .../htdocs/manual/mod/mod_auth_anon.html | 80 ++--- APACHE_1_2_X/htdocs/manual/mod/mod_dir.html | 20 ++ .../htdocs/manual/mod/mod_include.html | 12 +- APACHE_1_2_X/htdocs/manual/mod/mod_proxy.html | 4 +- .../htdocs/manual/mod/mod_rewrite.html | 8 +- .../htdocs/manual/mod/mod_status.html | 2 +- .../htdocs/manual/new_features_1_2.html | 12 +- APACHE_1_2_X/htdocs/manual/process-model.html | 6 +- APACHE_1_2_X/htdocs/manual/suexec.html | 313 ++++++++--------- APACHE_1_2_X/htdocs/manual/virtual-host.html | 4 +- .../htdocs/manual/mod/mod_autoindex.html | 20 ++ 24 files changed, 753 insertions(+), 745 deletions(-) diff --git a/APACHE_1_2_X/htdocs/index.html b/APACHE_1_2_X/htdocs/index.html index a454ba31623..e0fddd7f07d 100644 --- a/APACHE_1_2_X/htdocs/index.html +++ b/APACHE_1_2_X/htdocs/index.html @@ -1,23 +1,33 @@ - -Test Page for Apache - - -

It Worked!

- -If you can see this, then your -Apache installation was -successful. You may now add content to this directory and -replace this page. - -

-The Apache documentation has been -included with this distribution. - -

-You are free to use the image below on an Apache-powered web -server. Thanks for using Apache! - -

- - - + + + + Test Page for Apache + + + +

It Worked!

+

+ If you can see this, then your + Apache installation was + successful. You may now add content to this directory and + replace this page. +

+

+ The Apache documentation has been + included with this distribution. +

+

+ You are free to use the image below on an Apache-powered web + server. Thanks for using Apache! +

+

+ +

+ + diff --git a/APACHE_1_2_X/htdocs/manual/custom-error.html b/APACHE_1_2_X/htdocs/manual/custom-error.html index 3f04af058b0..3165ec044e6 100644 --- a/APACHE_1_2_X/htdocs/manual/custom-error.html +++ b/APACHE_1_2_X/htdocs/manual/custom-error.html @@ -29,9 +29,9 @@ response, then this response can be replaced with either some friendlier text or by a redirection to another URL (local or external). - +

- +

Old behavior
NCSA httpd 1.3 would return some boring old error/problem message diff --git a/APACHE_1_2_X/htdocs/manual/index.html b/APACHE_1_2_X/htdocs/manual/index.html index 1604b742723..40067e6beab 100644 --- a/APACHE_1_2_X/htdocs/manual/index.html +++ b/APACHE_1_2_X/htdocs/manual/index.html @@ -19,6 +19,7 @@

Release Notes

@@ -337,7 +337,7 @@ application/octet-stream bin dms lha lzh exe class tgz taz

Why does Apache start more slowly when using the - proxy module?

+ proxy module? If you're using the ProxyBlock or NoCache directives, hostnames' IP addresses are looked up and cached during diff --git a/APACHE_1_2_X/htdocs/manual/mod/mod_rewrite.html b/APACHE_1_2_X/htdocs/manual/mod/mod_rewrite.html index 03eaa5801f7..8d432e4c4ef 100644 --- a/APACHE_1_2_X/htdocs/manual/mod/mod_rewrite.html +++ b/APACHE_1_2_X/htdocs/manual/mod/mod_rewrite.html @@ -988,10 +988,10 @@ comma-separated list of the following flags: which will be expanded. You can use this flag more than once to set more than one variable. The variables can be later dereferenced at a lot of situations, but the usual location will be from within XSSI (via - <!--#echo var="VAR"-->) or CGI (e.g. $ENV{'VAR'}). - But additionally you can also dereference it in a following RewriteCond - pattern via %{ENV:VAR}. Use this to strip but remember - information from URLs. + <!--#echo var="VAR"-->) or CGI (e.g. $ENV{'VAR'}). + But additionally you can also dereference it in a following RewriteCond + pattern via %{ENV:VAR}. Use this to strip but remember + information from URLs.

diff --git a/APACHE_1_2_X/htdocs/manual/mod/mod_status.html b/APACHE_1_2_X/htdocs/manual/mod/mod_status.html index f5a55fa397c..f671ad78367 100644 --- a/APACHE_1_2_X/htdocs/manual/mod/mod_status.html +++ b/APACHE_1_2_X/htdocs/manual/mod/mod_status.html @@ -90,7 +90,7 @@ mark@ukweb.com and tell me your configuration. Do this by adding the following to the AUX_CFLAGS line in the "Configuration" file and then recompiling as usual.

-	AUX_CFLAGS= (something) -DSTATUS
+        AUX_CFLAGS= (something) -DSTATUS
 
diff --git a/APACHE_1_2_X/htdocs/manual/new_features_1_2.html b/APACHE_1_2_X/htdocs/manual/new_features_1_2.html index 1b0bda3021b..419b0c872ba 100644 --- a/APACHE_1_2_X/htdocs/manual/new_features_1_2.html +++ b/APACHE_1_2_X/htdocs/manual/new_features_1_2.html @@ -193,12 +193,12 @@ NCSA:
  • Optional proxy module
    An improved FTP, HTTP, and CONNECT mode SSL proxy is included with Apache 1.2. Some of the changes visible to users: -
    -
    - Improved FTP proxy supporting PASV mode -
    - ProxyBlock directive for excluding sites to proxy -
    - NoCache * directive for disabling proxy caching -
    - Numerous bug fixes -
    +
    +
    - Improved FTP proxy supporting PASV mode +
    - ProxyBlock directive for excluding sites to proxy +
    - NoCache * directive for disabling proxy caching +
    - Numerous bug fixes +
    diff --git a/APACHE_1_2_X/htdocs/manual/process-model.html b/APACHE_1_2_X/htdocs/manual/process-model.html index c130decffa7..2c37337b70f 100644 --- a/APACHE_1_2_X/htdocs/manual/process-model.html +++ b/APACHE_1_2_X/htdocs/manual/process-model.html @@ -39,9 +39,9 @@ as too confusing. The defaults for each variable are:
    -MinSpareServers		5
    -MaxSpareServers		10
    -StartServers		5
    +MinSpareServers         5
    +MaxSpareServers         10
    +StartServers            5
     
    There is an absolute maximum number of simultaneous children defined diff --git a/APACHE_1_2_X/htdocs/manual/suexec.html b/APACHE_1_2_X/htdocs/manual/suexec.html index 7806bc8f55c..0157cd0c1b5 100644 --- a/APACHE_1_2_X/htdocs/manual/suexec.html +++ b/APACHE_1_2_X/htdocs/manual/suexec.html @@ -17,14 +17,15 @@

      - CONTENTS -
    1. What is suEXEC?
    2. -
    3. Before we begin.
    4. -
    5. suEXEC Security Model.
    6. -
    7. Configuring & Installing suEXEC
    8. -
    9. Enabling & Disabling suEXEC
    10. -
    11. Debugging suEXEC
    12. -
    13. Beware the Jabberwock: Warnings & Examples
    14. + CONTENTS +
    15. What is suEXEC?
    16. +
    17. Before we begin.
    18. +
    19. suEXEC Security Model.
    20. +
    21. Configuring & Installing suEXEC
    22. +
    23. Enabling & Disabling suEXEC
    24. +
    25. Debugging suEXEC
    26. +
    27. Beware the Jabberwock: Warnings & + Examples

    @@ -119,124 +120,124 @@ user and group IDs under which the program is to execute. The wrapper then employs the following process to determine success or failure -- if any one of these conditions fail, the program logs the failure and exits with an error, otherwise it will continue: -
      -
    1. Was the wrapper called with the proper number of arguments? -
      - The wrapper will only execute if it is given the proper number of arguments. - The proper argument format is known to the Apache web server. If the wrapper - is not receiving the proper number of arguments, it is either being hacked, or - there is something wrong with the suEXEC portion of your Apache binary. -
      -
    2. -
    3. Is the user executing this wrapper a valid user of this system? -
      - This is to ensure that the user executing the wrapper is truly a user of the system. -
      -
    4. -
    5. Is this valid user allowed to run the wrapper? -
      - Is this user the user allowed to run this wrapper? Only one user (the Apache - user) is allowed to execute this program. -
      -
    6. -
    7. Does the target program have an unsafe hierarchical reference? -
      - Does the target program contain a leading '/' or have a '..' backreference? These - are not allowed; the target program must reside within the Apache webspace. -
      -
    8. -
    9. Is the target user name valid? -
      - Does the target user exist? -
      -
    10. -
    11. Is the target group name valid? -
      - Does the target group exist? -
      -
    12. -
    13. Is the target user NOT superuser? -
      - Presently, suEXEC does not allow 'root' to execute CGI/SSI programs. -
      -
    14. -
    15. Is the target userid ABOVE the minimum ID number? -
      - The minimum user ID number is specified during configuration. This allows you - to set the lowest possible userid that will be allowed to execute CGI/SSI programs. - This is useful to block out "system" accounts. -
      -
    16. -
    17. Is the target group NOT the superuser group? -
      - Presently, suEXEC does not allow the 'root' group to execute CGI/SSI programs. -
      -
    18. -
    19. Is the target groupid ABOVE the minimum ID number? -
      - The minimum group ID number is specified during configuration. This allows you - to set the lowest possible groupid that will be allowed to execute CGI/SSI programs. - This is useful to block out "system" groups. -
      -
    20. -
    21. Can the wrapper successfully become the target user and group? -
      - Here is where the program becomes the target user and group via setuid and setgid - calls. The group access list is also initialized with all of the groups of which - the user is a member. -
      -
    22. -
    23. Does the directory in which the program resides exist? -
      - If it doesn't exist, it can't very well contain files. -
      -
    24. -
    25. Is the directory within the Apache webspace? -
      - If the request is for a regular portion of the server, is the requested directory - within the server's document root? If the request is for a UserDir, is the requested - directory within the user's document root? -
      -
    26. -
    27. Is the directory NOT writable by anyone else? -
      - We don't want to open up the directory to others; only the owner user may be able - to alter this directories contents. -
      -
    28. -
    29. Does the target program exist? -
      - If it doesn't exists, it can't very well be executed. -
      -
    30. -
    31. Is the target program NOT writable by anyone else? -
      - We don't want to give anyone other than the owner the ability to change the program. -
      -
    32. -
    33. Is the target program NOT setuid or setgid? -
      - We do not want to execute programs that will then change our UID/GID again. -
      -
    34. -
    35. Is the target user/group the same as the program's user/group? -
      - Is the user the owner of the file? -
      -
    36. -
    37. Can we successfully clean the process environment to ensure safe operations? -
      - suEXEC cleans the process' environment by establishing a safe execution PATH (defined - during configuration), as well as only passing through those variables whose names - are listed in the safe environment list (also created during configuration). -
      -
    38. -
    39. Can we successfully become the target program and execute? -
      - Here is where suEXEC ends and the target program begins. -
      -
    40. -
    +
      +
    1. Was the wrapper called with the proper number of arguments? +
      + The wrapper will only execute if it is given the proper number of arguments. + The proper argument format is known to the Apache web server. If the wrapper + is not receiving the proper number of arguments, it is either being hacked, or + there is something wrong with the suEXEC portion of your Apache binary. +
      +
    2. +
    3. Is the user executing this wrapper a valid user of this system? +
      + This is to ensure that the user executing the wrapper is truly a user of the system. +
      +
    4. +
    5. Is this valid user allowed to run the wrapper? +
      + Is this user the user allowed to run this wrapper? Only one user (the Apache + user) is allowed to execute this program. +
      +
    6. +
    7. Does the target program have an unsafe hierarchical reference? +
      + Does the target program contain a leading '/' or have a '..' backreference? These + are not allowed; the target program must reside within the Apache webspace. +
      +
    8. +
    9. Is the target user name valid? +
      + Does the target user exist? +
      +
    10. +
    11. Is the target group name valid? +
      + Does the target group exist? +
      +
    12. +
    13. Is the target user NOT superuser? +
      + Presently, suEXEC does not allow 'root' to execute CGI/SSI programs. +
      +
    14. +
    15. Is the target userid ABOVE the minimum ID number? +
      + The minimum user ID number is specified during configuration. This allows you + to set the lowest possible userid that will be allowed to execute CGI/SSI programs. + This is useful to block out "system" accounts. +
      +
    16. +
    17. Is the target group NOT the superuser group? +
      + Presently, suEXEC does not allow the 'root' group to execute CGI/SSI programs. +
      +
    18. +
    19. Is the target groupid ABOVE the minimum ID number? +
      + The minimum group ID number is specified during configuration. This allows you + to set the lowest possible groupid that will be allowed to execute CGI/SSI programs. + This is useful to block out "system" groups. +
      +
    20. +
    21. Can the wrapper successfully become the target user and group? +
      + Here is where the program becomes the target user and group via setuid and setgid + calls. The group access list is also initialized with all of the groups of which + the user is a member. +
      +
    22. +
    23. Does the directory in which the program resides exist? +
      + If it doesn't exist, it can't very well contain files. +
      +
    24. +
    25. Is the directory within the Apache webspace? +
      + If the request is for a regular portion of the server, is the requested directory + within the server's document root? If the request is for a UserDir, is the requested + directory within the user's document root? +
      +
    26. +
    27. Is the directory NOT writable by anyone else? +
      + We don't want to open up the directory to others; only the owner user may be able + to alter this directories contents. +
      +
    28. +
    29. Does the target program exist? +
      + If it doesn't exists, it can't very well be executed. +
      +
    30. +
    31. Is the target program NOT writable by anyone else? +
      + We don't want to give anyone other than the owner the ability to change the program. +
      +
    32. +
    33. Is the target program NOT setuid or setgid? +
      + We do not want to execute programs that will then change our UID/GID again. +
      +
    34. +
    35. Is the target user/group the same as the program's user/group? +
      + Is the user the owner of the file? +
      +
    36. +
    37. Can we successfully clean the process environment to ensure safe operations? +
      + suEXEC cleans the process' environment by establishing a safe execution PATH (defined + during configuration), as well as only passing through those variables whose names + are listed in the safe environment list (also created during configuration). +
      +
    38. +
    39. Can we successfully become the target program and execute? +
      + Here is where suEXEC ends and the target program begins. +
      +
    40. +

    @@ -257,7 +258,7 @@ section of this document. BACK TO CONTENTS

    -

    Configuring & Installing suEXEC

    +

    Configuring & Installing suEXEC

    Here's where we begin the fun. The configuration and installation of suEXEC is a four step process: edit the suEXEC header file, compile suEXEC, place the @@ -396,7 +397,7 @@ user shell, do so now and execute the following commands. BACK TO CONTENTS

    -

    Enabling & Disabling suEXEC

    +

    Enabling & Disabling suEXEC

    After properly installing the suexec wrapper executable, you must kill and restart the Apache server. A simple @@ -454,7 +455,7 @@ and the error_log for the server to see where you may have gone astray. BACK TO CONTENTS

    -

    Beware the Jabberwock: Warnings & Examples

    +

    Beware the Jabberwock: Warnings & Examples

    NOTE! This section may not be complete. For the latest revision of this section of the documentation, see the Apache Group's @@ -467,33 +468,33 @@ There are a few points of interest regarding the wrapper that can cause limitations on server setup. Please review these before submitting any "bugs" regarding suEXEC.

      - suEXEC Points Of Interest -
    • Hierarchy limitations -
      - For security and efficiency reasons, all suexec requests must - remain within either a top-level document root for virtual - host requests, or one top-level personal document root for - userdir requests. For example, if you have four VirtualHosts - configured, you would need to structure all of your VHosts' - document roots off of one main Apache document hierarchy to - take advantage of suEXEC for VirtualHosts. (Example forthcoming.) -
      -
    • -
    • suEXEC's PATH environment variable -
      - This can be a dangerous thing to change. Make certain every - path you include in this define is a trusted - directory. You don't want to open people up to having someone - from across the world running a trojan horse on them. -
      -
    • -
    • Altering the suEXEC code -
      - Again, this can cause Big Trouble if you try - this without knowing what you are doing. Stay away from it - if at all possible. -
      -
    • + suEXEC Points Of Interest +
    • Hierarchy limitations +
      + For security and efficiency reasons, all suexec requests must + remain within either a top-level document root for virtual + host requests, or one top-level personal document root for + userdir requests. For example, if you have four VirtualHosts + configured, you would need to structure all of your VHosts' + document roots off of one main Apache document hierarchy to + take advantage of suEXEC for VirtualHosts. (Example forthcoming.) +
      +
    • +
    • suEXEC's PATH environment variable +
      + This can be a dangerous thing to change. Make certain every + path you include in this define is a trusted + directory. You don't want to open people up to having someone + from across the world running a trojan horse on them. +
      +
    • +
    • Altering the suEXEC code +
      + Again, this can cause Big Trouble if you try + this without knowing what you are doing. Stay away from it + if at all possible. +
      +

    diff --git a/APACHE_1_2_X/htdocs/manual/virtual-host.html b/APACHE_1_2_X/htdocs/manual/virtual-host.html index 6bfa8fb626c..b94a0fcecf8 100644 --- a/APACHE_1_2_X/htdocs/manual/virtual-host.html +++ b/APACHE_1_2_X/htdocs/manual/virtual-host.html @@ -186,9 +186,9 @@ for the root process. This will exhibit itself as errors in the error log like "rlimit" to some large number, like 512.

  • Edit http_main.c to add calls to setrlimit() from main(), along the lines of
    -	struct rlimit rlp;
    +        struct rlimit rlp;
     
    -	rlp.rlim_cur = rlp.rlim_max = 512;
    +        rlp.rlim_cur = rlp.rlim_max = 512;
             if (setrlimit(RLIMIT_NPROC, &rlp)) {
                 fprintf(stderr, "setrlimit(RLIMIT_NPROC) failed.\n");
                 exit(1);
    diff --git a/unlabeled-1.6.2/htdocs/manual/mod/mod_autoindex.html b/unlabeled-1.6.2/htdocs/manual/mod/mod_autoindex.html
    index aebd31a5bb8..a6cccca6100 100644
    --- a/unlabeled-1.6.2/htdocs/manual/mod/mod_autoindex.html
    +++ b/unlabeled-1.6.2/htdocs/manual/mod/mod_autoindex.html
    @@ -324,6 +324,26 @@ This will suppress the file size in fancy indexing listings.
     
    This will suppress the file description in fancy indexing listings. +
    IconHeight[=pixels] (Apache 1.3 and later) +
    + +Presence of this option, when used with IconWidth, will cause the server +to include HEIGHT and WIDTH attributes in the +IMG tag for the file icon. This allows browser to +precalculate the page layout without having to wait until all the +images have been loaded. If no value is given for the option, it +defaults to the standard height of the icons supplied with the Apache +software. +
    IconWidth[=pixels] (Apache 1.3 and later) +
    + +Presence of this option, when used with IconHeight, will cause the server +to include HEIGHT and WIDTH attributes in the +IMG tag for the file icon. This allows browser to +precalculate the page layout without having to wait until all the +images have been loaded. If no value is given for the option, it +defaults to the standard width of the icons supplied with the Apache +software. This default is that no options are enabled. If multiple IndexOptions could apply to a directory, then the most specific one is taken complete; -- 2.47.2