From 586ce2b9ea7167197074f6b5ad8d3ff85993ccfd Mon Sep 17 00:00:00 2001
From: Jim Jagielski The REMOTE_ADDR
The IP address of the remote host
+
- REMOTE_PORT
The port of the remote host The port of the remote host (2.4.26 and later)
REMOTE_HOST
The host name of the remote host
diff --git a/docs/manual/mod/directives.html.de b/docs/manual/mod/directives.html.de
index f40d5d3d09..1f01d55ddd 100644
--- a/docs/manual/mod/directives.html.de
+++ b/docs/manual/mod/directives.html.de
@@ -560,6 +560,7 @@
REMOTE_USER
Status: Extension
-Module Identifier: brotli_module
+Source File: mod_brotli.c
+Source File: mod_brotli.c Compatibility: Available in version 2.4.26 and later. Summary
mod_brotli
module provides
the BROTLI_COMPRESS
output filter that allows output from
your server to be compressed using the brotli compression format before being sent to the client over
- the network.
Some web applications are vulnerable to an information disclosure - attack when a TLS connection carries deflate compressed data. For more + attack when a TLS connection carries compressed data. For more information, review the details of the "BREACH" family of attacks.
This is a simple configuration that compresses common text-based content types.
@@ -77,7 +79,7 @@ contentSome web applications are vulnerable to an information disclosure - attack when a TLS connection carries deflate compressed data. For more + attack when a TLS connection carries compressed data. For more information, review the details of the "BREACH" family of attacks.
no-brotli
,
set via SetEnv
, which
- will ignore the accept-encoding setting of your browser and will
- send compressed output.
+ will disable brotli compression for a particular request, even if
+ it is supported by the client.
The mod_brotli
module also provides a filter for
- decompressing a brotli compressed request body . In order to activate
- this feature you have to insert the BROTLI_COMPRESS
filter into
- the input filter chain using SetInputFilter
or AddInputFilter
, for example:
<Location "/dav-area"> - SetInputFilter BROTLI_COMPRESS -</Location>- - -
Now if a request contains a Content-Encoding:
- brotli
header, the body will be automatically decompressed.
- Few browsers have the ability to brotli request bodies. However,
- some special applications actually do support request
- compression, for instance some WebDAV clients.
If you evaluate the request body yourself, don't trust
- the Content-Length
header!
- The Content-Length header reflects the length of the
- incoming data from the client and not the byte count of
- the decompressed data stream.
User-Agent
header, you must
manually configure an addition to the Vary
header
to alert proxies of the additional restrictions. For example,
- in a typical configuration where the addition of the DEFLATE
+ in a typical configuration where the addition of the BROTLI_COMPRESS
filter depends on the User-Agent
, you should add:
Header append Vary User-Agent@@ -181,25 +158,25 @@ content
<IfModule mod_headers.c> # Serve brotli compressed CSS files if they exist # and the client accepts brotli. - RewriteCond "%{HTTP:Accept-encoding}" "brotli" + RewriteCond "%{HTTP:Accept-encoding}" "br" RewriteCond "%{REQUEST_FILENAME}\.br" "-s" RewriteRule "^(.*)\.css" "$1\.css\.br" [QSA] # Serve brotli compressed JS files if they exist # and the client accepts brotli. - RewriteCond "%{HTTP:Accept-encoding}" "brotli" + RewriteCond "%{HTTP:Accept-encoding}" "br" RewriteCond "%{REQUEST_FILENAME}\.br" "-s" RewriteRule "^(.*)\.js" "$1\.js\.br" [QSA] - # Serve correct content types, and prevent mod_brotli double brotli. - RewriteRule "\.css\.gz$" "-" [T=text/css,E=no-brotli:1] - RewriteRule "\.js\.gz$" "-" [T=text/javascript,E=no-brotli:1] + # Serve correct content types, and prevent double compression. + RewriteRule "\.css\.br$" "-" [T=text/css,E=no-brotli:1] + RewriteRule "\.js\.br$" "-" [T=text/javascript,E=no-brotli:1] - <FilesMatch "(\.js\.gz|\.css\.gz)$"> + <FilesMatch "(\.js\.br|\.css\.br)$"> # Serve correct encoding type. - Header append Content-Encoding brotli + Header append Content-Encoding br # Force proxies to cache brotli & # non-brotli css/js files separately. @@ -225,12 +202,14 @@ content
Append the compression method onto the end of the ETag, causing compressed and uncompressed representations to have unique ETags. - This has been the default since 2.4.0, but prevents serving - "HTTP Not Modified" (304) responses to conditional requests for - compressed content.
Don't change the ETag on a compressed response. This was the default - prior to 2.4.0, but does not satisfy the HTTP/1.1 property that all +
Don't change the ETag on a compressed response. In another dynamic + compression module, mod_deflate, this has been the default prior to + 2.4.0. This setting does not satisfy the HTTP/1.1 property that all representations of the same resource have unique ETags.
Remove the ETag header from compressed responses. This prevents @@ -244,7 +223,7 @@ content
Description: | Maximum input block size |
---|---|
Syntax: | BrotliCompressionMaxInputBlock value |
Default: | BrotliCompressionMaxInputBlock 0 |
Default: | (automatic) |
Context: | server config, virtual host |
Status: | Extension |
Module: | mod_brotli |
Module: | mod_brotli |
The BrotliCompressionQuality
directive specifies
- the compression quality performed (a value between 0 and 11). Higher
- quality values result in better compression but also slower compression
- as well.
+ the compression quality (a value between 0 and 11). Higher quality values
+ result in better, but also slower compression.
The BrotliCompressionWindow
directive specifies the
- brotli sliding compression window size (a value between 10 and 24). Generally, the
- higher the window size, the higher can the compression ratio be expected
- but requires more memory.
Description: | Enable, optionally enable or disable the PROXY protocol handling |
---|---|
Syntax: | RemoteIPProxyProtocol On|Optional|Off |
Description: | Enable or disable PROXY protocol handling |
Syntax: | RemoteIPProxyProtocol On|Off |
Context: | server config, virtual host |
Status: | Base |
Module: | mod_remoteip |
Compatibility: | RemoteIPProxyProtocol is only available in httpd 2.4.26 and newer |
The RemoteIPProxyProtocol
enables or
+
The RemoteIPProxyProtocol
directive enables or
disables the reading and handling of the PROXY protocol connection header.
If enabled with the On
flag, the upstream client must
send the header every time it opens a connection or the connection will
- be aborted. If enabled with the Optional
flag, the upstream
- client may send the header.
RemoteIPProxyProtocolExceptions
+ directive.
While this directive may be specified in any virtual host, it is important to understand that because the PROXY protocol is connection @@ -253,42 +254,48 @@ RemoteIPProxiesHeader X-Forwarded-By in the other, that won't work; in such a case the last one wins and a notice will be logged indicating which setting was being overridden.
-On
and Optional
- flags, connections will not be aborted if the header is not sent.
- Instead, enforcement will happen after the request is read so virtual
- hosts configured with On
will return a 400 Bad Request.
- Virtual hosts configured with Optional
will continue as
- usual but without replacing the client IP informationListen 80 -<VirtualHost *:80> - ServerName www.example.com - RemoteIPProxyProtocol Optional - - #Requests to this virtual host may optionally not have - # a PROXY protocol header provided -</VirtualHost> - <VirtualHost *:80> ServerName www.example.com RemoteIPProxyProtocol On #Requests to this virtual host must have a PROXY protocol - # header provided. If it is missing, a 400 will result + # header provided. If it is missing, the connection will + # be aborted </VirtualHost> Listen 8080 <VirtualHost *:8080> ServerName www.example.com RemoteIPProxyProtocol On + RemoteIPProxyProtocolExceptions 127.0.0.1 10.0.0.0/8 #Requests to this virtual host must have a PROXY protocol # header provided. If it is missing, the connection will - # be aborted + # be aborted except when coming from localhost or the + # 10.x.x.x RFC1918 range </VirtualHost>+
Description: | Disable processing of PROXY header for certain hosts or networks |
---|---|
Syntax: | RemoteIPProxyProtocolExceptions host|range [host|range] [host|range] |
Context: | server config, virtual host |
Status: | Base |
Module: | mod_remoteip |
Compatibility: | RemoteIPProxyProtocolExceptions is only available in httpd 2.4.26 and newer |
The RemoteIPProxyProtocol
directive enables or
+ disables the reading and handling of the PROXY protocol connection header.
+ Sometimes it is desirable to require clients to provide the PROXY header, but
+ permit other clients to connect without it. This directive allows a server
+ administrator to configure a single host or CIDR range of hosts that may do
+ so. This is generally useful for monitoring and administrative traffic to a
+ virtual host direct to the server behind the upstream load balancer.
Server
Last-Modified
headers are generated by the
+Last-Modified
headers are generated by the
server.TRACE
-Anfragen festmime.types
fileTRACE
-Anfragen festmime.types
fileVerfügbare Sprachen: de | diff --git a/docs/manual/mod/quickreference.html.en b/docs/manual/mod/quickreference.html.en index 75b0f2c7b8..f0af8501d4 100644 --- a/docs/manual/mod/quickreference.html.en +++ b/docs/manual/mod/quickreference.html.en @@ -271,7 +271,7 @@ authentication succeeds but authorization fails
Server
HTTP response
+Server
HTTP response
headerLast-Modified
headers are generated by the
+Last-Modified
headers are generated by the
server.TRACE
requestsmime.types
fileTRACE
requestsmime.types
fileAvailable Languages: de | diff --git a/docs/manual/mod/quickreference.html.es b/docs/manual/mod/quickreference.html.es index 5e9f6786c3..be4f5f2b7d 100644 --- a/docs/manual/mod/quickreference.html.es +++ b/docs/manual/mod/quickreference.html.es @@ -274,7 +274,7 @@ authentication succeeds but authorization fails
Server
HTTP response
+Server
HTTP response
headerLast-Modified
headers are generated by the
+Last-Modified
headers are generated by the
server.TRACE
requestsmime.types
fileTRACE
requestsmime.types
fileIdiomas disponibles: de | diff --git a/docs/manual/mod/quickreference.html.fr b/docs/manual/mod/quickreference.html.fr index 9c17ca58d5..e7acb05a04 100644 --- a/docs/manual/mod/quickreference.html.fr +++ b/docs/manual/mod/quickreference.html.fr @@ -340,7 +340,7 @@ charge
Server
HTTP å¿çããããè¨å®ããServer
HTTP å¿çããããè¨å®ããLast-Modified
headers are generated by the
+ [[!]env-variable[=value]] ...Last-Modified
headers are generated by the
server.TRACE
ã¡ã½ããã®ãªã¯ã¨ã¹ãã«å¯¾ããå¿çæ¹æ³ã決ãã
+TRACE
ã¡ã½ããã®ãªã¯ã¨ã¹ãã«å¯¾ããå¿çæ¹æ³ã決ãã
mime.types
ãã¡ã¤ã«ã®ä½ç½®mime.types
ãã¡ã¤ã«ã®ä½ç½®ç¿»è¨³æ¸ã¿è¨èª: de | diff --git a/docs/manual/mod/quickreference.html.ko.euc-kr b/docs/manual/mod/quickreference.html.ko.euc-kr index 0fb34acfb6..c350690831 100644 --- a/docs/manual/mod/quickreference.html.ko.euc-kr +++ b/docs/manual/mod/quickreference.html.ko.euc-kr @@ -262,7 +262,7 @@ authentication succeeds but authorization fails
Server
HTTP response
+Server
HTTP response
headerLast-Modified
headers are generated by the
+Last-Modified
headers are generated by the
server.TRACE
requestsmime.types
fileTRACE
requestsmime.types
file°¡´ÉÇÑ ¾ð¾î: de | diff --git a/docs/manual/mod/quickreference.html.tr.utf8 b/docs/manual/mod/quickreference.html.tr.utf8 index 91ff3b68c0..9e7b463bcf 100644 --- a/docs/manual/mod/quickreference.html.tr.utf8 +++ b/docs/manual/mod/quickreference.html.tr.utf8 @@ -274,7 +274,7 @@ authentication succeeds but authorization fails
Server
HTTP yanıt baÅlıÄını yapılandırır.
+Server
HTTP yanıt baÅlıÄını yapılandırır.
Last-Modified
headers are generated by the
+Last-Modified
headers are generated by the
server.TRACE
isteklerinde davranıŠÅeklini belirler
+TRACE
isteklerinde davranıŠÅeklini belirler
mime.types
filemime.types
fileMevcut Diller: de | diff --git a/docs/manual/mod/quickreference.html.zh-cn.utf8 b/docs/manual/mod/quickreference.html.zh-cn.utf8 index 26e817337a..014dfb5244 100644 --- a/docs/manual/mod/quickreference.html.zh-cn.utf8 +++ b/docs/manual/mod/quickreference.html.zh-cn.utf8 @@ -266,7 +266,7 @@ authentication succeeds but authorization fails
Server
HTTP response
+Server
HTTP response
headerLast-Modified
headers are generated by the
+Last-Modified
headers are generated by the
server.TRACE
requestsmime.types
fileTRACE
requestsmime.types
fileå¯ç¨è¯è¨: de | -- 2.40.0