From: Rich Bowen Date: Thu, 15 Mar 2012 11:26:30 +0000 (+0000) Subject: Links and typos. Daniel Gruno (rumble at cord dot dk) X-Git-Tag: 2.4.2~189 X-Git-Url: https://granicus.if.org/sourcecode?a=commitdiff_plain;h=afdd2c4274b13c742bf6ddb70fa083866230ad43;p=apache Links and typos. Daniel Gruno (rumble at cord dot dk) git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/branches/2.4.x@1300926 13f79535-47bb-0310-9956-ffa450edef68 --- diff --git a/docs/manual/logs.xml b/docs/manual/logs.xml index be260b311c..682858327b 100644 --- a/docs/manual/logs.xml +++ b/docs/manual/logs.xml @@ -298,7 +298,7 @@ almost never be used except on tightly controlled internal networks. Apache httpd will not even attempt to determine this information unless IdentityCheck is set + module="mod_ident">IdentityCheck is set to On.
frank (%u)
diff --git a/docs/manual/misc/security_tips.xml b/docs/manual/misc/security_tips.xml index 43460a16d5..e272f995f6 100644 --- a/docs/manual/misc/security_tips.xml +++ b/docs/manual/misc/security_tips.xml @@ -143,7 +143,7 @@

In typical operation, Apache is started by the root user, and it switches to the user defined by the User directive to serve hits. As is the + module="mod_unixd">User directive to serve hits. As is the case with any command that root executes, you must take care that it is protected from modification by non-root users. Not only must the files themselves be writeable only by root, but so must the directories, and @@ -291,7 +291,7 @@

Embedded scripting options which run as part of the server itself, such as mod_php, mod_perl, mod_tcl, and mod_python, run under the identity of the server itself - (see the User directive), and + (see the User directive), and therefore scripts executed by these engines potentially can access anything the server user can. Some scripting engines may provide restrictions, but it is better to be safe and assume not.

diff --git a/docs/manual/mod/mod_ldap.xml b/docs/manual/mod/mod_ldap.xml index 3188ab4679..db8c3692fe 100644 --- a/docs/manual/mod/mod_ldap.xml +++ b/docs/manual/mod/mod_ldap.xml @@ -677,7 +677,7 @@ connection client certificates.

If a connection is not successful with the timeout period, either an error will be returned or the LDAP client library will attempt to connect to a secondary LDAP server if one is specified (via a space-separated list of hostnames in the - AuthLDAPURL).

+ AuthLDAPURL).

The default is 10 seconds, if the LDAP client library linked with the server supports the LDAP_OPT_NETWORK_TIMEOUT option.