From 586bb590f5d9dd0cf00cfff2c0a33204bf9c864a Mon Sep 17 00:00:00 2001
From: Luca Toscano Strict
option. Due to legacy modules, applications or
- custom user-agents which must be deperecated the Unsafe
+ custom user-agents which must be deprecated the Unsafe
option has been added to revert to the legacy behaviors. These rules
are applied prior to request processing, so must be configured at the
global or default (first) matching virtual host section, by IP/port
@@ -2068,7 +2068,7 @@ media type in the HTTP Content-Type header field
risks of accepting non-conformant request messages, while
RFC 7230 §3.5 "Message Parsing Robustness" identify the
risks of accepting obscure whitespace and request message formatting.
- As of the introduction of this directive, all grammer rules of the
+ As of the introduction of this directive, all grammar rules of the
specification are enforced in the default Strict
operating
mode, and the strict whitespace suggested by section 3.5 is enforced
and cannot be relaxed.
RFC 2616 §19.6 "Compatibility With Previous Versions" had
encouraged HTTP servers to support legacy HTTP/0.9 requests. RFC 7230
- superceeds this with "The expectation to support HTTP/0.9 requests has
+ supersedes this with "The expectation to support HTTP/0.9 requests has
been removed" and offers additional comments in
RFC 7230 Appendix A. The Require1.0
option allows
the user to remove support of the default Allow0.9
option's
@@ -3942,7 +3942,7 @@ as if 'QualifyRedirectURL ON' was configured.
HTTP Methods that are not conforming to the relvant RFCs are normally +
HTTP Methods that are not conforming to the relevant RFCs are normally
rejected by request processing in Apache HTTPD. To avoid this, modules
can register non-standard HTTP methods they support.
The RegisterHttpMethod
allows to register such
--
2.50.1