Home php教程 php手册 ApacheReferenceManual6

ApacheReferenceManual6

Jun 13, 2016 am 10:28 AM
directive sec syntax

KeepAliveTimeout directive Syntax: KeepAliveTimeout seconds Default: KeepAliveTimeout 15 Context: server config Status: Core Compatibility: KeepAliveTimeout is only available in Apache 1.1 and later. The number of seconds Apache will wait for a subsequent request before closing the connection. Once a request has been received, the timeout value specified by the Timeout directive applies. -------------------------------------------------------------------------------- directive Syntax: ... Context: any Status: core Access controls are normally effective for all access methods, and this is the usual desired behaviour. In the general case, access control directives should not be placed within a section. The purpose of the directive is to restrict the effect of the access controls to the nominated HTTP methods. For all other methods, the access restrictions that are enclosed in the bracket will have no effect. The following example applies the access control only to the methods POST, PUT, and DELETE, leaving all other methods unprotected: require valid-user The method names listed can be one or more of: GET, POST, PUT, DELETE, CONNECT, OPTIONS, TRACE, PATCH, PROPFIND, PROPPATCH, MKCOL, COPY, MOVE, LOCK, and UNLOCK. The method name is case-sensitive. If GET is used it will also restrict HEAD requests. -------------------------------------------------------------------------------- directive Syntax: ... Context: any Status: core Compatibility: Available in Apache 1.3.5 and later and are used to enclose a group of access control directives which will then apply to any HTTP access method not listed in the arguments; i.e., it is the opposite of a section and can be used to control both standard and nonstandard/unrecognized methods. See the documentation for for more details. -------------------------------------------------------------------------------- LimitRequestBody directive Syntax: LimitRequestBody number Default: LimitRequestBody 0 Context: server config, virtual host, directory, .htaccess Status: core Compatibility: LimitRequestBody is only available in Apache 1.3.2 and later. Number is a long integer from 0 (meaning unlimited) to 2147483647 (2GB). The default value is defined by the compile-time constant DEFAULT_LIMIT_REQUEST_BODY (0 as distributed). The LimitRequestBody directive allows the user to set a limit on the allowed size of an HTTP request message body within the context in which the directive is given (server, per-directory, per-file or per-location). If the client request exceeds that limit, the server will return an error response instead of servicing the request. The size of a normal request message body will vary greatly depending on the nature of the resource and the methods allowed on that resource. CGI scripts typically use the message body for passing form information to the server. Implementations of the PUT method will require a value at least as large as any representation that the server wishes to accept for that resource. This directive gives the server administrator greater control over abnormal client request behavior, which may be useful for avoiding some forms of denial-of-service attacks. -------------------------------------------------------------------------------- LimitRequestFields directive Syntax: LimitRequestFields number Default: LimitRequestFields 100 Context: server config Status: core Compatibility: LimitRequestFields is only available in Apache 1.3.2 and later. Number is an integer from 0 (meaning unlimited) to 32767. The default value is defined by the compile-time constant DEFAULT_LIMIT_REQUEST_FIELDS (100 as distributed). The LimitRequestFields directive allows the server administrator to modify the limit on the number of request header fields allowed in an HTTP request. A server needs this value to be larger than the number of fields that a normal client request might include. The number of request header fields used by a client rarely exceeds 20, but this may vary among different client implementations, often depending upon the extent to which a user has configured their browser to support detailed content negotiation. Optional HTTP extensions are often expressed using request header fields. This directive gives the server administrator greater control over abnormal client request behavior, which may be useful for avoiding some forms of denial-of-service attacks. The value should be increased if normal clients see an error response from the server that indicates too many fields were sent in the request. -------------------------------------------------------------------------------- LimitRequestFieldsize directive Syntax: LimitRequestFieldsize number Default: LimitRequestFieldsize 8190 Context: server config Status: core Compatibility: LimitRequestFieldsize is only available in Apache 1.3.2 and later. Number is an integer size in bytes from 0 to the value of the compile-time constant DEFAULT_LIMIT_REQUEST_FIELDSIZE (8190 as distributed). The LimitRequestFieldsize directive allows the server administrator to reduce the limit on the allowed size of an HTTP request header field below the normal input buffer size compiled with the server. A server needs this value to be large enough to hold any one header field from a normal client request. The size of a normal request header field will vary greatly among different client implementations, often depending upon the extent to which a user has configured their browser to support detailed content negotiation. This directive gives the server administrator greater control over abnormal client request behavior, which may be useful for avoiding some forms of denial-of-service attacks. Under normal conditions, the value should not be changed from the default. -------------------------------------------------------------------------------- LimitRequestLine directive Syntax: LimitRequestLine number Default: LimitRequestLine 8190 Context: server config Status: core Compatibility: LimitRequestLine is only available in Apache 1.3.2 and later. Number is an integer size in bytes from 0 to the value of the compile-time constant DEFAULT_LIMIT_REQUEST_LINE (8190 as distributed). The LimitRequestLine directive allows the server administrator to reduce the limit on the allowed size of a clients HTTP request-line below the normal input buffer size compiled with the server. Since the request-line consists of the HTTP method, URI, and protocol version, the LimitRequestLine directive places a restriction on the length of a request-URI allowed for a request on the server. A server needs this value to be large enough to hold any of its resource names, including any information that might be passed in the query part of a GET request. This directive gives the server administrator greater control over abnormal client request behavior, which may be useful for avoiding some forms of denial-of-service attacks. Under normal conditions, the value should not be changed from the default. -------------------------------------------------------------------------------- Listen directive Syntax: Listen [IP address:]port number Context: server config Status: core Compatibility: Listen is only available in Apache 1.1 and later. The Listen directive instructs Apache to listen to more than one IP address or port; by default it responds to requests on all IP interfaces, but only on the port given by the Port directive. Listen can be used instead of BindAddress and Port. It tells the server to accept incoming requests on the specified port or address-and-port combination. If the first format is used, with a port number only, the server listens to the given port on all interfaces, instead of the port given by the Port directive. If an IP address is given as well as a port, the server wi

Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Article

R.E.P.O. Energy Crystals Explained and What They Do (Yellow Crystal)
1 months ago By 尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. Best Graphic Settings
1 months ago By 尊渡假赌尊渡假赌尊渡假赌
Will R.E.P.O. Have Crossplay?
1 months ago By 尊渡假赌尊渡假赌尊渡假赌

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

The U.S. spot ETH ETF listing plan is postponed, and the SEC requires a revised S-1 form to be submitted before July 8 The U.S. spot ETH ETF listing plan is postponed, and the SEC requires a revised S-1 form to be submitted before July 8 Jun 30, 2024 pm 08:38 PM

U.S. Spot Ethereum ETF Launch Delayed The U.S. Securities and Exchange Commission (SEC) has delayed the launch of its spot Ethereum exchange-traded fund (ETH ETF) and required issuers to resubmit Form S-1 before July 8. This decision has resulted in the postponement of the planned launch on July 2, with the new launch expected to be in mid-July or later. Background Overview There has been a change in the review process for spot Ethereum ETFs, with Bloomberg’s senior ETF analyst Eric Balchunas commenting on the SEC’s latest decision and its impact on market expectations. Earlier last month, SEC Chairman Gary Gensler

SEC seeks $5.3 billion fine against Terraform Labs and Do Kwon SEC seeks $5.3 billion fine against Terraform Labs and Do Kwon Apr 24, 2024 pm 03:25 PM

The agency is also seeking conduct-based and "compliance with the law" injunctions. The U.S. Securities and Exchange Commission (SEC) wants to fine Terraform Labs and its former CEO DoKwon nearly $5.3 billion for violations of U.S. securities laws and fraud charges. The agency detailed its requested fine in an April 19 legal filing. The SEC is primarily seeking $4.2 billion in disgorgement and $545.7 million in prejudgment interest. The purpose of the illegally obtained proceeds is to force TerraformLabs and Kwon to return the unfair benefits they obtained between June 2021 and May 2022 through the following channels: first, selling tokens to institutional investors; second, through their relationship with Genesi

The SEC Temporarily Suspends Its Allegations That SOL, ADA, and MATIC Are Unregistered Securities The SEC Temporarily Suspends Its Allegations That SOL, ADA, and MATIC Are Unregistered Securities Jul 31, 2024 am 12:25 AM

This decision comes amid the ongoing legal proceedings against Binance, one of the world's leading cryptocurrency exchanges.

In this article, learn about SEC and Fidelity talking about open staking for crypto ETFs! Discussing ETF staking, stablecoins and DeFi regulation In this article, learn about SEC and Fidelity talking about open staking for crypto ETFs! Discussing ETF staking, stablecoins and DeFi regulation Mar 04, 2025 am 11:09 AM

The minutes recently released by the Securities and Exchange Commission (SEC) show that the SEC Cryptocurrency Working Group (CTF) has held talks with Fidelity Investment and MITRE to discuss many key issues in crypto asset regulation. SEC and Fidelity: Pledge of crypto ETFs and related rules At this meeting, SEC and asset management giant Fidelity had in-depth exchanges on the issue of crypto asset supervision. Discussions cover: Customer protection rules related to brokerage dealers' interaction with digital asset securities (Rule15c3-3). Formulate standardized listing rules for digital asset exchange-traded products (ETPs). Clarify ETF pledged assets and operating specifications. Monitoring of blockchain tokens and financial instrument-related rewards (such as pledge income, liquidity mining)

Why Cancelled SEC vs Ripple Meeting Shouldn't Worry XRP Holders Why Cancelled SEC vs Ripple Meeting Shouldn't Worry XRP Holders Aug 01, 2024 pm 10:02 PM

The U.S. Securities and Exchange Commission (SEC) has cancelled a closed-door meeting that was initially scheduled for today at 2 PM Washington time.

The SEC No Longer Asks the Court to Deem the Tokens Named in Its Lawsuit against Binance as Securities The SEC No Longer Asks the Court to Deem the Tokens Named in Its Lawsuit against Binance as Securities Jul 30, 2024 pm 06:29 PM

The United States Securities and Exchange Commission (SEC) no longer asks the court to decide and deem the tokens named in its lawsuit against the crypto exchange

SEC issues Wells Notice against Uniswap, involving securities regulations SEC issues Wells Notice against Uniswap, involving securities regulations Apr 11, 2024 pm 02:58 PM

A Wells Notice is usually issued as a preliminary step before litigation. The U.S. Securities and Exchange Commission (SEC) issued a Wells Notice to UniswapLabs, the operating entity of Uniswap, a decentralized exchange based on the Ethereum chain. About Wells Notice A Wells Notice is a formal notice issued by the U.S. Securities and Exchange Commission (SEC) before it prepares to take enforcement action against an individual or company. This notification signals that the regulator has completed its investigation and found a violation, and the recipient of the notification has an opportunity to object or explain before formal enforcement action begins. Although the Wells Notice is not a necessary process required by law, the SEC and the National Association of Securities Dealers (N

To strengthen cryptocurrency regulation, Nigeria SEC launches 30-day registration period To strengthen cryptocurrency regulation, Nigeria SEC launches 30-day registration period Jun 22, 2024 pm 10:59 PM

The Nigeria Securities and Exchange Commission (SEC) recently launched a new registration scheme aimed at accelerating the registration process for Virtual Asset Service Providers (VASPs). According to the West African country’s securities market regulator, the move is an important amendment to existing rules aimed at bringing the regulatory framework up to date and adapting to the growing complexity of the cryptocurrency ecosystem. The Nigerian SEC sets a 30-day deadline to accelerate VASP registration. In March this year, the Nigerian SEC announced changes to digital asset issuance, issuance platforms, trading and custody rules. The most eye-catching one is to increase the VASP registration fee from N30 million. (approximately US$20,161) to 150 million naira (approximately US$100,806). This change triggered an industry

See all articles