From: Rich Bowen
This directive is evaluated at configuration processing time,
- not at runtime. As a result, this directive cannot be conditonally
+ not at runtime. As a result, this directive cannot be conditionally
evaluated by enclosing it in an
This directive allows to configure the size (in bytes) of the memory buffer used to read data from the network or files.
-A larger buffer can increase peformances with larger data, but consumes +
A larger buffer can increase performances with larger data, but consumes more memory per connection. The minimum configurable size is 1024.
@@ -5012,7 +5012,7 @@ certain events before failing a request This directive is evaluated at configuration processing time,
- not at runtime. As a result, this directive cannot be conditonally
+ not at runtime. As a result, this directive cannot be conditionally
evaluated by enclosing it in an
Windows systems should be isolated at the network layer from making outbound SMB/NTLM calls to unexpected destinations as a - more comprehensive and pre-emptive measure.
+ more comprehensive and preemptive measure.Aliases and Redirects occurring in different contexts are processed
like other directives according to standard merging rules. But when multiple
+ href="../sections.html#merging">merging rules. But when multiple
Aliases or Redirects occur in the same context (for example, in the
same
The authentication type None disables authentication.
When authentication is enabled, it is normally inherited by each
- subsequent configuration section,
+ subsequent configuration section,
unless a different authentication type is specified. If no
authentication is desired for a subsection of an authenticated
section, the authentication type None may be used;
diff --git a/docs/manual/mod/mod_authnz_ldap.xml b/docs/manual/mod/mod_authnz_ldap.xml
index 0de645ff3a..f0375ba276 100644
--- a/docs/manual/mod/mod_authnz_ldap.xml
+++ b/docs/manual/mod/mod_authnz_ldap.xml
@@ -1426,7 +1426,7 @@ You can of course use search parameters on each of these.
ldap:// on port 389.If the algorithm type HS256 is used, the algorithm is set to HMAC-SHA256, and the secret is set within the file specified as the third parameter. The contents of the bearer token is still visible, and so - the channel must still be protected from evesdropping through TLS.
+ the channel must still be protected from eavesdropping through TLS.If the signature is verified, and if present, the sub claim is assigned to REMOTE_USER.
@@ -158,7 +158,7 @@ JWT tokenIf the algorithm type HS256 is used, the algorithm is set to HMAC-SHA256, and the secret is set within the file specified as the third parameter. The contents of the bearer token is still visible, and so - the channel must still be protected from evesdropping through TLS.
+ the channel must still be protected from eavesdropping through TLS.If authentication succeeds but authorization fails, Apache HTTPD will
respond with an HTTP response code of '401 UNAUTHORIZED' by default. This
- usually causes browsers to display the password dialogue to the user
+ usually causes browsers to display the password dialog to the user
again, which is not wanted in all situations.
Order of processing is important and is affected both by the order in the configuration file and by placement in configuration sections. These + href="../sections.html#merging">configuration sections. These two directives have a different effect if reversed:
Since 2.4.10, new measures are in place to avoid the reference time from being inflated by cache hits or slow requests. First, the reference - time is not updated if no backend LDAP conncetions were needed. Second, + time is not updated if no backend LDAP connections were needed. Second, the reference time uses the time the HTTP request was received instead of the time the request is completed.
diff --git a/docs/manual/mod/mod_negotiation.xml b/docs/manual/mod/mod_negotiation.xml index c7f3aae6d8..6b1b53e3e3 100644 --- a/docs/manual/mod/mod_negotiation.xml +++ b/docs/manual/mod/mod_negotiation.xml @@ -226,7 +226,7 @@ cached by proxy serversIf set, this directive allows content-negotiated documents to be cached by proxy servers. This could mean that clients - behind those proxys could retrieve versions of the documents + behind those proxies could retrieve versions of the documents that are not the best match for their abilities, but it will make caching more efficient.
diff --git a/docs/manual/mod/mod_proxy.xml b/docs/manual/mod/mod_proxy.xml index c6884701a9..0e24999262 100644 --- a/docs/manual/mod/mod_proxy.xml +++ b/docs/manual/mod/mod_proxy.xml @@ -1646,7 +1646,7 @@ ProxyPassMatch "^/(.*\.gif)$" "http://backend.example.com/$1" behavior regarding reuse/keepalive of backend connections (which were never reused before for these URLs), the parameter enablereuse (or disablereuse) default tooff (resp. on)
- in this case. Setting enablereuse=on explicitely allows to
+ in this case. Setting enablereuse=on explicitly allows to
reuse connections unless some backreference(s) belong in
the authority part (hostname and/or port) of the url
(this condition is enforced since Apache HTTP Server 2.4.55, and produces
diff --git a/docs/manual/mod/mod_proxy_ajp.xml b/docs/manual/mod/mod_proxy_ajp.xml
index da143b0691..0a35bb1318 100644
--- a/docs/manual/mod/mod_proxy_ajp.xml
+++ b/docs/manual/mod/mod_proxy_ajp.xml
@@ -506,7 +506,7 @@ attribute_value := (string)
ssl_key_size refer to the
corresponding pieces of HTTP and HTTPS.
The jvm_route, is used to support sticky
- sessions -- associating a user's sesson with a particular Tomcat instance
+ sessions -- associating a user's session with a particular Tomcat instance
in the presence of multiple, load-balancing servers.
The secret is sent when the secret=secret_keyword
parameter is used in
diff --git a/docs/manual/mod/mod_proxy_balancer.xml b/docs/manual/mod/mod_proxy_balancer.xml
index f409299fef..8ee4a6a986 100644
--- a/docs/manual/mod/mod_proxy_balancer.xml
+++ b/docs/manual/mod/mod_proxy_balancer.xml
@@ -79,18 +79,18 @@
configure the Balancer and BalancerMembers.
The balancer supports stickyness. When a request is proxied
+ The balancer supports stickiness. When a request is proxied
to some back-end, then all following requests from the same user
should be proxied to the same back-end. Many load balancers implement
this feature via a table that maps client IP addresses to back-ends.
This approach is transparent to clients and back-ends, but suffers
from some problems: unequal load distribution if clients are themselves
- hidden behind proxies, stickyness errors when a client uses a dynamic
- IP address that changes during a session and loss of stickyness, if the
+ hidden behind proxies, stickiness errors when a client uses a dynamic
+ IP address that changes during a session and loss of stickiness, if the
mapping table overflows. The module The module
Another example of how to provide load balancing with stickyness +
Another example of how to provide load balancing with stickiness
using
When using cookie based stickyness, you need to configure the
+ When using cookie based stickiness, you need to configure the
name of the cookie that contains the information about which back-end
to use. This is done via the stickysession attribute added
to either Some back-ends use a slightly different form of stickyness cookie,
+ Some back-ends use a slightly different form of stickiness cookie,
for instance Apache Tomcat. Tomcat adds the name of the Tomcat instance
to the end of its session id cookie, separated with a dot ( The second way of implementing stickyness is URL encoding.
+ The second way of implementing stickiness is URL encoding.
The web server searches for a query parameter in the URL of the request.
The name of the parameter is specified again using stickysession.
The value of the parameter is used to lookup a member worker with route
@@ -271,15 +271,15 @@ ProxyPass "/test" "balancer://mycluster" stickysession=JSESSIONID|jsessionid sco
for the same request, the information from the request parameter is used. If you experience stickyness errors, e.g. users lose their
+ If you experience stickiness errors, e.g. users lose their
application sessions and need to login again, you first want to
check whether this is because the back-ends are sometimes unavailable
or whether your configuration is wrong. To find out about possible
stability problems with the back-ends, check your Apache error log
for proxy error messages. To verify your configuration, first check, whether the stickyness
+ To verify your configuration, first check, whether the stickiness
is based on a cookie or on URL encoding. Next step would be logging
the appropriate data in the access log by using an enhanced
Common reasons for loss of session are session timeouts,
which are usually configurable on the back-end server. The balancer also logs detailed information about handling
- stickyness to the error log, if the log level is set to
+ stickiness to the error log, if the log level is set to
.)
from the session id. Thus if the Apache web server finds a dot in the value
- of the stickyness cookie, it only uses the part behind the dot to search
+ of the stickiness cookie, it only uses the part behind the dot to search
for the route. In order to let Tomcat know about its instance name, you
need to set the attribute jvmRoute inside the Tomcat
configuration file conf/server.xml to the value of the
@@ -239,7 +239,7 @@ ProxyPassReverse "/test" "balancer://mycluster"
The name of the session cookie used by Tomcat (and more generally by Java
web applications based on servlets) is JSESSIONID
(upper case) but can be configured to something else.debug or higher. This is an easy way to
- troubleshoot stickyness problems, but the log volume might
+ troubleshoot stickiness problems, but the log volume might
be too high for production servers under high load.
Internally, mod_proxy_html uses the HTMLParser module from the third-party libxml2 library. Unlike other libxml2 parsers, HTMLParser deals with HTML without diff --git a/docs/manual/mod/mod_ssl.xml b/docs/manual/mod/mod_ssl.xml index eb76be094f..f1c813ce90 100644 --- a/docs/manual/mod/mod_ssl.xml +++ b/docs/manual/mod/mod_ssl.xml @@ -1944,7 +1944,7 @@ on such a connection identifies any other non-default virtual host, the compatibility policy is tested.
The strict policy blocks all HTTP requests which are
-identified with a different virtual host to that identifed by SNI.
+identified with a different virtual host to that identified by SNI.
The insecure policy allows all HTTP requests regardless
of virtual host identified; such a configuration may be vulnerable to
module="mod_ssl">SSLCipherSuite and
During the build process, adding the keyword "install" to the makefile command line
will automatically produce a complete distribution package under the subdirectory
DIST. Install httpd by simply copying the distribution that was produced
- by the makfiles to the root of a NetWare volume (see: Compiling Apache httpd for
+ by the makefiles to the root of a NetWare volume (see: Compiling Apache httpd for
NetWare below).
-n, httpd will use the file name compiled into the
server, such as conf\httpd.conf. This built-in path
is relative to the installation directory. You can verify the compiled
- file name from a value labelled as SERVER_CONFIG_FILE when
+ file name from a value labeled as SERVER_CONFIG_FILE when
invoking httpd with the -V switch, like this:
/apache by default, you can verify it by using
- httpd.exe -V and looking for a value labelled as
+ httpd.exe -V and looking for a value labeled as
HTTPD_ROOT.When two parameters are provided, under some conditions the parameters -will have the same value. For example, if rotation is triggerd but the +will have the same value. For example, if rotation is triggered but the portions of the time and date incorporated into the log filename do not change across the rotation.
This creates the files /var/log/logfile.yyyy.mm where
yyyy is the year and mm is the month. Every day at midnight, rotation
will occur, including running programs specified with -p.
- Despite rotation ocurring, the filename will only change on the first
+ Despite rotation occurring, the filename will only change on the first
rotation of the month. Rotation on other days will continue to output file
and append to it.
L flag can be useful in this context to end the
Setting this flag is required to allow a rewrite to continue If the HTTP request being written has an encoded question mark, '%3f', and the - rewritten result has a '?' in the substiution. This protects from a malicious + rewritten result has a '?' in the substitution. This protects from a malicious URL taking advantage of a capture and re-substitution of the encoded question mark.
Many of the solutions in this section will all use the same condition, -which leaves the matched value in the %2 backreference. %1 is the beginining +which leaves the matched value in the %2 backreference. %1 is the beginning of the query string (up to the key of intererest), and %3 is the remainder. This condition is a bit complex for flexibility and to avoid double '&&' in the substitutions.
diff --git a/docs/manual/ssl/ssl_howto.xml b/docs/manual/ssl/ssl_howto.xml index c4f541a0bd..2fedfab0a1 100644 --- a/docs/manual/ssl/ssl_howto.xml +++ b/docs/manual/ssl/ssl_howto.xml @@ -400,7 +400,7 @@ SSLVerifyDepth 1The
Name-based virtual hosting builds off of the IP-based virtual host - selection algorithm, meaning that comparisons of ther requested hostname + selection algorithm, meaning that comparisons of the requested hostname to configured hostnames occurs only within the set of virtual hosts that share the most specific IP:PORT based match at the network layer.