From: Daniel Gruno rate-limit
.
+# Our internally trusted proxies; +10.0.2.0/24 #Everyone in the testing group +gateway.localdomain #The front end balancer +
The '#
' hash character designates a comment line, otherwise
- each whitespace or newline seperated entry is processed identically to
+ each whitespace or newline separated entry is processed identically to
the
For example, you might define a
You would then be able to use this map in a
The following combinations for MapType and MapSource can be used:
@@ -293,42 +295,38 @@ Apache HTTP Server 2.0.41 and laterThe .htaccess
file,
This directive is required for per-directory rewrites whose context
- is a directory made available via the
If your URL path does not exist verbatim on the filesystem,
- or isn't directly under your .htaccess
file where you want to use
The example below demonstrates how to map
- http://example.com/myapp/index.html to
- /home/www/example/newsite.html, in a .htaccess
file. This
- assumes that the content available at
- http://example.com/ is on disk at /home/www/example/
-RewriteEngine On -# The URL-path used to get to this context, not the filesystem path -RewriteBase /myapp/ -RewriteRule ^index\.html$ newsite.html --
The
This directive is required when you use a relative path + in a substitution in per-directory (htaccess) context unless either + of the following conditions are true:
+ In the example below,
+-RewriteCond %{REMOTE_HOST} ^host1 [OR] RewriteCond %{REMOTE_HOST} ^host2 [OR] RewriteCond %{REMOTE_HOST} ^host3 RewriteRule ...some special stuff for any of these hosts... -
User-Agent:
'' header of the request, you can
use the following:
-+-RewriteCond %{HTTP_USER_AGENT} ^Mozilla RewriteRule ^/$ /homepage.max.html [L] @@ -875,8 +870,7 @@ RewriteCond %{HTTP_USER_AGENT} ^Lynx RewriteRule ^/$ /homepage.min.html [L] RewriteRule ^/$ /homepage.std.html [L] -
Explanation: If you use a browser which identifies itself as 'Mozilla' (including Netscape Navigator, Mozilla etc), then you @@ -911,10 +905,11 @@ RewriteRule ^/$ /homepage.std.html [L]
Pattern is a perl compatible regular - expression. On the first RewriteRule it is applied to the (%-decoded) - URL-path of the request; - subsequent patterns are applied to the output of the last matched - RewriteRule.
+ expression. On the first RewriteRule, it is matched against + the (%-decoded) URL-path (or + file-path, depending + on the context) of the request. Subsequent patterns are matched against the + output of the last matching RewriteRule.In
In
%{REQUEST_URI}
variable in
@@ -1006,7 +1001,7 @@ cannot use $N
in the substitution string!
to be delivered to the client. Substitutions are only
treated as a file-system path when the rule is configured in
server (virtualhost) context and the first component of the
- path in the substitution is exists in the file-system
+ path in the substitution exists in the file-system
$N
in the substitution string!
- In addition to plain text, the Substition string can include
+In addition to plain text, the Substitution string can include
$N
) to the RewriteRule
@@ -1073,7 +1068,7 @@ cannot use $N
in the substitution string!
Rewrite rules are applied to the results of previous rewrite rules, in the order in which they are defined - in the config file. The URI or file path (see "What is matched?", above) is completely replaced by the Substitution and the rewriting process continues until all rules have been applied, diff --git a/docs/manual/mod/mod_sed.xml b/docs/manual/mod/mod_sed.xml index 1a0c991ec2..639a909d5e 100644 --- a/docs/manual/mod/mod_sed.xml +++ b/docs/manual/mod/mod_sed.xml @@ -62,33 +62,29 @@ the author's blog.
session
.
The session is not useful unless it can be written to or read from. The
@@ -141,9 +143,11 @@
X-Replace-Session
.
The header should contain name value pairs expressed in the same format @@ -151,11 +155,13 @@ empty string has the effect of removing that key from the session.
If configured, the session can be read back from the HTTP_SESSION
@@ -164,10 +170,12 @@
Once read, the CGI variable HTTP_SESSION
should contain
@@ -187,9 +195,11 @@
module.
The session will be automatically decrypted on load, and encrypted on @@ -223,9 +233,11 @@ as in the example below.
In cases where the Apache server forms the frontend for backend origin servers, @@ -244,14 +256,16 @@ the session.
See the
For more examples on how the session can be configured to be read @@ -100,8 +102,10 @@
The session will be encrypted with the given key. Different servers can @@ -95,19 +97,27 @@ which are specified as parameters with optional values after the driver name.
The NSS crypto driver might have already been configured by another @@ -117,7 +127,9 @@ To avoid this warning, use the noinit parameter as follows.
To prevent confusion, ensure that all modules requiring NSS are configured with @@ -127,7 +139,9 @@ the engine to be used for encryption.
For more examples on how the session can be configured to be read @@ -126,8 +130,10 @@ userid, configure the session as follows:
netscape
if the
browser is mozilla but not MSIE.
-User-Agent
HTTP request header. The following two
lines have the same effect:
-Some additional examples:
-The
The first three will set the environment variable
object_is_image
if the request was for an image
@@ -261,9 +260,9 @@ for additional examples.
and applied env-variable in the same fashion as
This would set the environment variable iso_delivered
every time our application attempts to send it via X-Sendfile
A more useful example would be to set the variable rfc1918 if the remote IP address is a private address according to RFC 1918:
-This will cause the site
environment variable
to be set to "example
" if the HTTP request header
diff --git a/docs/manual/mod/mod_so.xml b/docs/manual/mod/mod_so.xml
index cef79cb8da..045cab3395 100644
--- a/docs/manual/mod/mod_so.xml
+++ b/docs/manual/mod/mod_so.xml
@@ -144,7 +144,7 @@ Windows
For example:
-loads the named module from the modules subdirectory of the ServerRoot.
diff --git a/docs/manual/mod/mod_ssl.xml b/docs/manual/mod/mod_ssl.xml index 21c79382fe..9a40a4d7c0 100644 --- a/docs/manual/mod/mod_ssl.xml +++ b/docs/manual/mod/mod_ssl.xml @@ -169,8 +169,9 @@ For backward compatibility there is additionally a special provided. Information about this function is provided in the Compatibility chapter.The following example grants access if the user is authenticated either with a client certificate or by username and password.
-/dev/urandom
is
better, because it never blocks and actually gives the amount of requested
data. The drawback is just that the quality of the received data may not
- be the best.
-
- On some platforms like FreeBSD one can even control how the entropy is
- actually generated, i.e. by which system interrupts. More details one can
- find under rndcontrol(8) on those platforms. Alternatively, when
- your system lacks such a random device, you can use tool
- like EGD
- (Entropy Gathering Daemon) and run it's client program with the
- exec:/path/to/program/
variant (see below) or use
- egd:/path/to/egd-socket
(see below).
exec:/path/to/program
@@ -400,13 +394,15 @@ The following source variants are available:
on your platform.The ssl-cache
mutex is used to serialize access to
@@ -503,7 +501,9 @@ global/inter-process SSL Session Cache and the OpenSSL internal memory cache.
It can be set as low as 15 for testing, but should be set to higher
values like 300 in real life.
In Apache 2.1 and later, optional
. This enables support for
@@ -608,7 +610,9 @@ The available (case-insensitive) protocols are:
+SSLv3 +TLSv1 +TLSv1.1 +TLSv1.2
, respectively.
ALL:!aNULL:RC4+RSA:+HIGH:+MEDIUM:+LOW:+SSLv2:+EXP
'' which
-means the following: first, remove from consideration any ciphers that do not
-authenticate, i.e. for SSL the Anonymous Diffie-Hellman ciphers. Next,
-use ciphers using RC4 and RSA. Next include the high, medium and then the low
-security ciphers. Finally pull all SSLv2 and export ciphers to the
-end of the list.
+``RC4-SHA:AES128-SHA:HIGH:MEDIUM:!aNULL:!MD5
'' which
+means the following: Put RC4-SHA
and AES128-SHA
at
+the beginning. We do this, because these ciphers offer a good compromise
+between speed and security. Next, include high and medium security ciphers.
+Finally, remove all ciphers which do not authenticate, i.e. for SSL the
+Anonymous Diffie-Hellman ciphers, as well as all ciphers which use
+MD5
as hash algorithm, because it has been proven insufficient.
-$ openssl ciphers -v 'ALL:!ADH:RC4+RSA:+HIGH:+MEDIUM:+LOW:+SSLv2:+EXP' -NULL-SHA SSLv3 Kx=RSA Au=RSA Enc=None Mac=SHA1 -NULL-MD5 SSLv3 Kx=RSA Au=RSA Enc=None Mac=MD5 -EDH-RSA-DES-CBC3-SHA SSLv3 Kx=DH Au=RSA Enc=3DES(168) Mac=SHA1 +$ openssl ciphers -v 'RC4-SHA:AES128-SHA:HIGH:MEDIUM:!aNULL:!MD5' +RC4-SHA SSLv3 Kx=RSA Au=RSA Enc=RC4(128) Mac=SHA1 +AES128-SHA SSLv3 Kx=RSA Au=RSA Enc=AES(128) Mac=SHA1 +DHE-RSA-AES256-SHA SSLv3 Kx=DH Au=RSA Enc=AES(256) Mac=SHA1 ... ... ... ... ... -EXP-RC4-MD5 SSLv3 Kx=RSA(512) Au=RSA Enc=RC4(40) Mac=MD5 export -EXP-RC2-CBC-MD5 SSLv2 Kx=RSA(512) Au=RSA Enc=RC2(40) Mac=MD5 export -EXP-RC4-MD5 SSLv2 Kx=RSA(512) Au=RSA Enc=RC4(40) Mac=MD5 export +SEED-SHA SSLv3 Kx=RSA Au=RSA Enc=SEED(128) Mac=SHA1 +PSK-RC4-SHA SSLv3 Kx=PSK Au=PSK Enc=RC4(128) Mac=SHA1 +KRB5-RC4-SHA SSLv3 Kx=KRB5 Au=KRB5 Enc=RC4(128) Mac=SHA1
The complete list of particular RSA & DH ciphers for SSL is given in Table 2.