From b209756b03e38ce4580a03b112c7d91fde432a3d Mon Sep 17 00:00:00 2001
From: Ken Coar
-
+
-
+
If you are lucky, this means that the buggy client will fully close the
connection and release the resources on your server. However, there
@@ -77,16 +77,16 @@ TCP implementation.
The clients on which this problem has been verified to exist:
This does not appear to be a problem on:
@@ -155,56 +155,56 @@ violation of the RFC, but it is widely recognized as being necessary.
The following systems are known to have a timeout:
The following systems are known to not have a timeout:
There is a
diff --git a/docs/manual/misc/index.html b/docs/manual/misc/index.html
index 127b1f2f0d..2b44c66131 100644
--- a/docs/manual/misc/index.html
+++ b/docs/manual/misc/index.html
@@ -21,92 +21,92 @@
- A list of one or more 'magic' userIDs which are allowed access
- without password verification. The userIDs are space separated.
- It is possible to use the ' and " quotes to allow a space in
- a userID as well as the \ escape character.
-
- Please note that the comparison is case-IN-sensitive.
-
- Example:
- This would allow the user to enter without password verification
- by using the userId's 'anonymous', 'AnonyMous','Not Registered' and
- 'I Don't Know'.
+ A list of one or more 'magic' userIDs which are allowed access
+ without password verification. The userIDs are space separated.
+ It is possible to use the ' and " quotes to allow a space in
+ a userID as well as the \ escape character.
+
+ Please note that the comparison is case-IN-sensitive.
+
+ Example:
+ This would allow the user to enter without password verification
+ by using the userId's 'anonymous', 'AnonyMous','Not Registered' and
+ 'I Don't Know'.
- Be sure you know what you are doing when you decide to switch
- it on. And remember that it is the linking order of the modules
- (in the Configuration / Make file) which details the order
- in which the Authorization modules are queried.
+
+ Be sure you know what you are doing when you decide to switch
+ it on. And remember that it is the linking order of the modules
+ (in the Configuration / Make file) which details the order
+ in which the Authorization modules are queried.
- When set 'on', the default, the 'password' entered (which hopefully
- contains a sensible email address) is logged in the httpd-log file.
+ When set 'on', the default, the 'password' entered (which hopefully
+ contains a sensible email address) is logged in the httpd-log file.
- Specifies whether the user must specify an email
- address as the password. This prohibits blank passwords.
+ Specifies whether the user must specify an email
+ address as the password. This prohibits blank passwords.
- When set 'on', users can leave
- the userID (and perhaps the password field) empty. This
- can be very convenient for MS-Explorer users who can
- just hit return or click directly on the OK button; which
- seems a natural reaction.
+ When set 'on', users can leave
+ the userID (and perhaps the password field) empty. This
+ can be very convenient for MS-Explorer users who can
+ just hit return or click directly on the OK button; which
+ seems a natural reaction.
- When set 'on' the 'password' entered is
- checked for at least one '@' and a '.' to encourage users to enter
- valid email addresses (see the above
-Anonymous_MustGiveEmail on
AuthName Use 'anonymous' & Email address for guest entry
@@ -217,8 +217,8 @@ This version: 23 Nov 1995, 24 Feb 1996, 16 May 1996.
"=" and "!=" bind more tightly than "&&" and
diff --git a/docs/manual/mod/mod_proxy.html b/docs/manual/mod/mod_proxy.html
index e0aef68846..30926d4da6 100644
--- a/docs/manual/mod/mod_proxy.html
+++ b/docs/manual/mod/mod_proxy.html
@@ -297,7 +297,7 @@ disables caching completely.
diff --git a/docs/manual/mod/mod_status.html b/docs/manual/mod/mod_status.html
index f5a55fa397..f671ad7836 100644
--- a/docs/manual/mod/mod_status.html
+++ b/docs/manual/mod/mod_status.html
@@ -90,7 +90,7 @@ mark@ukweb.com and tell me your configuration.
Do this by adding the following to the AUX_CFLAGS line in the
"Configuration" file and then recompiling as usual.
-
-
-
-
ndd
to
- modify tcp_fin_wait_2_flush_interval
, but the
- default should be appropriate for most servers and improper
- tuning can have negative impacts.
- SO_LINGER
socket option
- which is enabled by Apache. This parameter can be adjusted
- by using nettune
to modify parameters such as
- tcp_keepstart
and tcp_keepstop
.
- In later revisions, there is an explicit timer for
- connections in FIN_WAIT_2 that can be modified; contact HP
- support for details.
- ndd
to
+ modify tcp_fin_wait_2_flush_interval
, but the
+ default should be appropriate for most servers and improper
+ tuning can have negative impacts.
+ SO_LINGER
socket option
+ which is enabled by Apache. This parameter can be adjusted
+ by using nettune
to modify parameters such as
+ tcp_keepstart
and tcp_keepstop
.
+ In later revisions, there is an explicit timer for
+ connections in FIN_WAIT_2 that can be modified; contact HP
+ support for details.
+
-
diff --git a/docs/manual/mod/mod_include.html b/docs/manual/mod/mod_include.html
index 6f51130998..f1576471e6 100644
--- a/docs/manual/mod/mod_include.html
+++ b/docs/manual/mod/mod_include.html
@@ -309,15 +309,15 @@ elements are:
Unix egrep command.
Module: mod_auth_anon
- I strongly suggest that the magic username 'anonymous
'
- is always one of the allowed userIDs.
-
-
- Anonymous: anonymous "Not Registered" 'I don\'t know'
-
+ I strongly suggest that the magic username 'anonymous
'
+ is always one of the allowed userIDs.
+
+
+ Anonymous: anonymous "Not Registered" 'I don\'t know'
+
Anonymous_Authoritative
@@ -91,12 +91,12 @@ allows users to share URLs.
When set 'on', there is no
fall-through to other authorization methods. So if a
userID does not match the values specified in the
- Anonymous
directive, access is denied.
- Anonymous
directive, access is denied.
+
Anonymous_LogEmail
@@ -107,8 +107,8 @@ allows users to share URLs.
Status: Extension
Module: mod_auth_anon
Anonymous_MustGiveEmail
@@ -120,8 +120,8 @@ allows users to share URLs.
Status: Extension
Module: mod_auth_anon
Anonymous_NoUserID
@@ -132,11 +132,11 @@ allows users to share URLs.
Status: Extension
Module: mod_auth_anon
@@ -148,9 +148,9 @@ allows users to share URLs.
Status: Extension
Module: mod_auth_anonAuth_LogEmail
).
+ When set 'on' the 'password' entered is
+ checked for at least one '@' and a '.' to encourage users to enter
+ valid email addresses (see the above Auth_LogEmail
).
Example
@@ -180,10 +180,10 @@ Excerpt of access.conf:
Anonymous anonymous guest www test welcome
+Anonymous_MustGiveEmail on
Anonymous_VerifyEmail on
-Anonymous_NoUserId off
-Anonymous_LogEmail on
+Anonymous_NoUserId off
+Anonymous_LogEmail on
AuthType basicWhy does Apache start more slowly when using the
- proxy module?
+ proxy module?
If you're using the ProxyBlock
or NoCache
directives, hostnames' IP addresses are looked up and cached during
diff --git a/docs/manual/mod/mod_rewrite.html b/docs/manual/mod/mod_rewrite.html
index 03eaa5801f..8d432e4c4e 100644
--- a/docs/manual/mod/mod_rewrite.html
+++ b/docs/manual/mod/mod_rewrite.html
@@ -988,10 +988,10 @@ comma-separated list of the following flags:
which will be expanded. You can use this flag more than once to set more
than one variable. The variables can be later dereferenced at a lot of
situations, but the usual location will be from within XSSI (via
- <!--#echo var="VAR"-->) or CGI (e.g. $ENV{'VAR'}).
- But additionally you can also dereference it in a following RewriteCond
- pattern via %{ENV:VAR}. Use this to strip but remember
- information from URLs.
+ <!--#echo var="VAR"-->) or CGI (e.g. $ENV{'VAR'}).
+ But additionally you can also dereference it in a following RewriteCond
+ pattern via %{ENV:VAR}. Use this to strip but remember
+ information from URLs.
- AUX_CFLAGS= (something) -DSTATUS
+ AUX_CFLAGS= (something) -DSTATUS
diff --git a/docs/manual/platform/perf.html b/docs/manual/platform/perf.html
index 450536257a..566cc0f271 100644
--- a/docs/manual/platform/perf.html
+++ b/docs/manual/platform/perf.html
@@ -61,9 +61,9 @@ Digital UNIX
diff --git a/docs/manual/process-model.html b/docs/manual/process-model.html
index c130decffa..2c37337b70 100644
--- a/docs/manual/process-model.html
+++ b/docs/manual/process-model.html
@@ -39,9 +39,9 @@ as too confusing.
The defaults for each variable are:
-MinSpareServers 5
-MaxSpareServers 10
-StartServers 5
+MinSpareServers 5
+MaxSpareServers 10
+StartServers 5
There is an absolute maximum number of simultaneous children defined
diff --git a/docs/manual/suexec.html b/docs/manual/suexec.html
index 7806bc8f55..0157cd0c1b 100644
--- a/docs/manual/suexec.html
+++ b/docs/manual/suexec.html
@@ -17,14 +17,15 @@
-
- The wrapper will only execute if it is given the proper number of arguments. - The proper argument format is known to the Apache web server. If the wrapper - is not receiving the proper number of arguments, it is either being hacked, or - there is something wrong with the suEXEC portion of your Apache binary. --
- This is to ensure that the user executing the wrapper is truly a user of the system. --
- Is this user the user allowed to run this wrapper? Only one user (the Apache - user) is allowed to execute this program. --
- Does the target program contain a leading '/' or have a '..' backreference? These - are not allowed; the target program must reside within the Apache webspace. --
- Does the target user exist? --
- Does the target group exist? --
- Presently, suEXEC does not allow 'root' to execute CGI/SSI programs. --
- The minimum user ID number is specified during configuration. This allows you - to set the lowest possible userid that will be allowed to execute CGI/SSI programs. - This is useful to block out "system" accounts. --
- Presently, suEXEC does not allow the 'root' group to execute CGI/SSI programs. --
- The minimum group ID number is specified during configuration. This allows you - to set the lowest possible groupid that will be allowed to execute CGI/SSI programs. - This is useful to block out "system" groups. --
- Here is where the program becomes the target user and group via setuid and setgid - calls. The group access list is also initialized with all of the groups of which - the user is a member. --
- If it doesn't exist, it can't very well contain files. --
- If the request is for a regular portion of the server, is the requested directory - within the server's document root? If the request is for a UserDir, is the requested - directory within the user's document root? --
- We don't want to open up the directory to others; only the owner user may be able - to alter this directories contents. --
- If it doesn't exists, it can't very well be executed. --
- We don't want to give anyone other than the owner the ability to change the program. --
- We do not want to execute programs that will then change our UID/GID again. --
- Is the user the owner of the file? --
- suEXEC cleans the process' environment by establishing a safe execution PATH (defined - during configuration), as well as only passing through those variables whose names - are listed in the safe environment list (also created during configuration). --
- Here is where suEXEC ends and the target program begins. --
+ The wrapper will only execute if it is given the proper number of arguments. + The proper argument format is known to the Apache web server. If the wrapper + is not receiving the proper number of arguments, it is either being hacked, or + there is something wrong with the suEXEC portion of your Apache binary. ++
+ This is to ensure that the user executing the wrapper is truly a user of the system. ++
+ Is this user the user allowed to run this wrapper? Only one user (the Apache + user) is allowed to execute this program. ++
+ Does the target program contain a leading '/' or have a '..' backreference? These + are not allowed; the target program must reside within the Apache webspace. ++
+ Does the target user exist? ++
+ Does the target group exist? ++
+ Presently, suEXEC does not allow 'root' to execute CGI/SSI programs. ++
+ The minimum user ID number is specified during configuration. This allows you + to set the lowest possible userid that will be allowed to execute CGI/SSI programs. + This is useful to block out "system" accounts. ++
+ Presently, suEXEC does not allow the 'root' group to execute CGI/SSI programs. ++
+ The minimum group ID number is specified during configuration. This allows you + to set the lowest possible groupid that will be allowed to execute CGI/SSI programs. + This is useful to block out "system" groups. ++
+ Here is where the program becomes the target user and group via setuid and setgid + calls. The group access list is also initialized with all of the groups of which + the user is a member. ++
+ If it doesn't exist, it can't very well contain files. ++
+ If the request is for a regular portion of the server, is the requested directory + within the server's document root? If the request is for a UserDir, is the requested + directory within the user's document root? ++
+ We don't want to open up the directory to others; only the owner user may be able + to alter this directories contents. ++
+ If it doesn't exists, it can't very well be executed. ++
+ We don't want to give anyone other than the owner the ability to change the program. ++
+ We do not want to execute programs that will then change our UID/GID again. ++
+ Is the user the owner of the file? ++
+ suEXEC cleans the process' environment by establishing a safe execution PATH (defined + during configuration), as well as only passing through those variables whose names + are listed in the safe environment list (also created during configuration). ++
+ Here is where suEXEC ends and the target program begins. ++
@@ -257,7 +258,7 @@ section of this document. BACK TO CONTENTS
-Here's where we begin the fun. The configuration and installation of suEXEC is a four step process: edit the suEXEC header file, compile suEXEC, place the @@ -396,7 +397,7 @@ user shell, do so now and execute the following commands. BACK TO CONTENTS
-After properly installing the suexec wrapper executable, you must kill and restart the Apache server. A simple @@ -454,7 +455,7 @@ and the error_log for the server to see where you may have gone astray. BACK TO CONTENTS
-NOTE! This section may not be complete. For the latest revision of this section of the documentation, see the Apache Group's @@ -467,33 +468,33 @@ There are a few points of interest regarding the wrapper that can cause limitations on server setup. Please review these before submitting any "bugs" regarding suEXEC.
- For security and efficiency reasons, all suexec requests must - remain within either a top-level document root for virtual - host requests, or one top-level personal document root for - userdir requests. For example, if you have four VirtualHosts - configured, you would need to structure all of your VHosts' - document roots off of one main Apache document hierarchy to - take advantage of suEXEC for VirtualHosts. (Example forthcoming.) --
- This can be a dangerous thing to change. Make certain every - path you include in this define is a trusted - directory. You don't want to open people up to having someone - from across the world running a trojan horse on them. --
- Again, this can cause Big Trouble if you try - this without knowing what you are doing. Stay away from it - if at all possible. --
+ For security and efficiency reasons, all suexec requests must + remain within either a top-level document root for virtual + host requests, or one top-level personal document root for + userdir requests. For example, if you have four VirtualHosts + configured, you would need to structure all of your VHosts' + document roots off of one main Apache document hierarchy to + take advantage of suEXEC for VirtualHosts. (Example forthcoming.) ++
+ This can be a dangerous thing to change. Make certain every + path you include in this define is a trusted + directory. You don't want to open people up to having someone + from across the world running a trojan horse on them. ++
+ Again, this can cause Big Trouble if you try + this without knowing what you are doing. Stay away from it + if at all possible. ++
diff --git a/docs/manual/suexec.html.en b/docs/manual/suexec.html.en index 7806bc8f55..0157cd0c1b 100644 --- a/docs/manual/suexec.html.en +++ b/docs/manual/suexec.html.en @@ -17,14 +17,15 @@
- The wrapper will only execute if it is given the proper number of arguments. - The proper argument format is known to the Apache web server. If the wrapper - is not receiving the proper number of arguments, it is either being hacked, or - there is something wrong with the suEXEC portion of your Apache binary. --
- This is to ensure that the user executing the wrapper is truly a user of the system. --
- Is this user the user allowed to run this wrapper? Only one user (the Apache - user) is allowed to execute this program. --
- Does the target program contain a leading '/' or have a '..' backreference? These - are not allowed; the target program must reside within the Apache webspace. --
- Does the target user exist? --
- Does the target group exist? --
- Presently, suEXEC does not allow 'root' to execute CGI/SSI programs. --
- The minimum user ID number is specified during configuration. This allows you - to set the lowest possible userid that will be allowed to execute CGI/SSI programs. - This is useful to block out "system" accounts. --
- Presently, suEXEC does not allow the 'root' group to execute CGI/SSI programs. --
- The minimum group ID number is specified during configuration. This allows you - to set the lowest possible groupid that will be allowed to execute CGI/SSI programs. - This is useful to block out "system" groups. --
- Here is where the program becomes the target user and group via setuid and setgid - calls. The group access list is also initialized with all of the groups of which - the user is a member. --
- If it doesn't exist, it can't very well contain files. --
- If the request is for a regular portion of the server, is the requested directory - within the server's document root? If the request is for a UserDir, is the requested - directory within the user's document root? --
- We don't want to open up the directory to others; only the owner user may be able - to alter this directories contents. --
- If it doesn't exists, it can't very well be executed. --
- We don't want to give anyone other than the owner the ability to change the program. --
- We do not want to execute programs that will then change our UID/GID again. --
- Is the user the owner of the file? --
- suEXEC cleans the process' environment by establishing a safe execution PATH (defined - during configuration), as well as only passing through those variables whose names - are listed in the safe environment list (also created during configuration). --
- Here is where suEXEC ends and the target program begins. --
+ The wrapper will only execute if it is given the proper number of arguments. + The proper argument format is known to the Apache web server. If the wrapper + is not receiving the proper number of arguments, it is either being hacked, or + there is something wrong with the suEXEC portion of your Apache binary. ++
+ This is to ensure that the user executing the wrapper is truly a user of the system. ++
+ Is this user the user allowed to run this wrapper? Only one user (the Apache + user) is allowed to execute this program. ++
+ Does the target program contain a leading '/' or have a '..' backreference? These + are not allowed; the target program must reside within the Apache webspace. ++
+ Does the target user exist? ++
+ Does the target group exist? ++
+ Presently, suEXEC does not allow 'root' to execute CGI/SSI programs. ++
+ The minimum user ID number is specified during configuration. This allows you + to set the lowest possible userid that will be allowed to execute CGI/SSI programs. + This is useful to block out "system" accounts. ++
+ Presently, suEXEC does not allow the 'root' group to execute CGI/SSI programs. ++
+ The minimum group ID number is specified during configuration. This allows you + to set the lowest possible groupid that will be allowed to execute CGI/SSI programs. + This is useful to block out "system" groups. ++
+ Here is where the program becomes the target user and group via setuid and setgid + calls. The group access list is also initialized with all of the groups of which + the user is a member. ++
+ If it doesn't exist, it can't very well contain files. ++
+ If the request is for a regular portion of the server, is the requested directory + within the server's document root? If the request is for a UserDir, is the requested + directory within the user's document root? ++
+ We don't want to open up the directory to others; only the owner user may be able + to alter this directories contents. ++
+ If it doesn't exists, it can't very well be executed. ++
+ We don't want to give anyone other than the owner the ability to change the program. ++
+ We do not want to execute programs that will then change our UID/GID again. ++
+ Is the user the owner of the file? ++
+ suEXEC cleans the process' environment by establishing a safe execution PATH (defined + during configuration), as well as only passing through those variables whose names + are listed in the safe environment list (also created during configuration). ++
+ Here is where suEXEC ends and the target program begins. ++
@@ -257,7 +258,7 @@ section of this document. BACK TO CONTENTS
-Here's where we begin the fun. The configuration and installation of suEXEC is a four step process: edit the suEXEC header file, compile suEXEC, place the @@ -396,7 +397,7 @@ user shell, do so now and execute the following commands. BACK TO CONTENTS
-After properly installing the suexec wrapper executable, you must kill and restart the Apache server. A simple @@ -454,7 +455,7 @@ and the error_log for the server to see where you may have gone astray. BACK TO CONTENTS
-NOTE! This section may not be complete. For the latest revision of this section of the documentation, see the Apache Group's @@ -467,33 +468,33 @@ There are a few points of interest regarding the wrapper that can cause limitations on server setup. Please review these before submitting any "bugs" regarding suEXEC.
- For security and efficiency reasons, all suexec requests must - remain within either a top-level document root for virtual - host requests, or one top-level personal document root for - userdir requests. For example, if you have four VirtualHosts - configured, you would need to structure all of your VHosts' - document roots off of one main Apache document hierarchy to - take advantage of suEXEC for VirtualHosts. (Example forthcoming.) --
- This can be a dangerous thing to change. Make certain every - path you include in this define is a trusted - directory. You don't want to open people up to having someone - from across the world running a trojan horse on them. --
- Again, this can cause Big Trouble if you try - this without knowing what you are doing. Stay away from it - if at all possible. --
+ For security and efficiency reasons, all suexec requests must + remain within either a top-level document root for virtual + host requests, or one top-level personal document root for + userdir requests. For example, if you have four VirtualHosts + configured, you would need to structure all of your VHosts' + document roots off of one main Apache document hierarchy to + take advantage of suEXEC for VirtualHosts. (Example forthcoming.) ++
+ This can be a dangerous thing to change. Make certain every + path you include in this define is a trusted + directory. You don't want to open people up to having someone + from across the world running a trojan horse on them. ++
+ Again, this can cause Big Trouble if you try + this without knowing what you are doing. Stay away from it + if at all possible. ++
-- 2.50.1