Home Backend Development PHP Tutorial ApacheReferenceManual6_PHP教程

ApacheReferenceManual6_PHP教程

Jul 13, 2016 pm 05:28 PM
directive sec syntax

KeepAliveTimeout directive Syntax: KeepAliveTimeout seconds Default: KeepAliveTimeout 15 Context: server config Status: Core Compatibility: KeepAliveTimeout is only available in Apache 1.1 and later. The number of seconds Apache will wait for a subsequent request before closing the connection. Once a request has been received, the timeout value specified by the Timeout directive applies. -------------------------------------------------------------------------------- directive Syntax: ... Context: any Status: core Access controls are normally effective for all access methods, and this is the usual desired behaviour. In the general case, access control directives should not be placed within a section. The purpose of the directive is to restrict the effect of the access controls to the nominated HTTP methods. For all other methods, the access restrictions that are enclosed in the bracket will have no effect. The following example applies the access control only to the methods POST, PUT, and DELETE, leaving all other methods unprotected: require valid-user The method names listed can be one or more of: GET, POST, PUT, DELETE, CONNECT, OPTIONS, TRACE, PATCH, PROPFIND, PROPPATCH, MKCOL, COPY, MOVE, LOCK, and UNLOCK. The method name is case-sensitive. If GET is used it will also restrict HEAD requests. -------------------------------------------------------------------------------- directive Syntax: ... Context: any Status: core Compatibility: Available in Apache 1.3.5 and later and are used to enclose a group of access control directives which will then apply to any HTTP access method not listed in the arguments; i.e., it is the opposite of a section and can be used to control both standard and nonstandard/unrecognized methods. See the documentation for for more details. -------------------------------------------------------------------------------- LimitRequestBody directive Syntax: LimitRequestBody number Default: LimitRequestBody 0 Context: server config, virtual host, directory, .htaccess Status: core Compatibility: LimitRequestBody is only available in Apache 1.3.2 and later. Number is a long integer from 0 (meaning unlimited) to 2147483647 (2GB). The default value is defined by the compile-time constant DEFAULT_LIMIT_REQUEST_BODY (0 as distributed). The LimitRequestBody directive allows the user to set a limit on the allowed size of an HTTP request message body within the context in which the directive is given (server, per-directory, per-file or per-location). If the client request exceeds that limit, the server will return an error response instead of servicing the request. The size of a normal request message body will vary greatly depending on the nature of the resource and the methods allowed on that resource. CGI scripts typically use the message body for passing form information to the server. Implementations of the PUT method will require a value at least as large as any representation that the server wishes to accept for that resource. This directive gives the server administrator greater control over abnormal client request behavior, which may be useful for avoiding some forms of denial-of-service attacks. -------------------------------------------------------------------------------- LimitRequestFields directive Syntax: LimitRequestFields number Default: LimitRequestFields 100 Context: server config Status: core Compatibility: LimitRequestFields is only available in Apache 1.3.2 and later. Number is an integer from 0 (meaning unlimited) to 32767. The default value is defined by the compile-time constant DEFAULT_LIMIT_REQUEST_FIELDS (100 as distributed). The LimitRequestFields directive allows the server administrator to modify the limit on the number of request header fields allowed in an HTTP request. A server needs this value to be larger than the number of fields that a normal client request might include. The number of request header fields used by a client rarely exceeds 20, but this may vary among different client implementations, often depending upon the extent to which a user has configured their browser to support detailed content negotiation. Optional HTTP extensions are often expressed using request header fields. This directive gives the server administrator greater control over abnormal client request behavior, which may be useful for avoiding some forms of denial-of-service attacks. The value should be increased if normal clients see an error response from the server that indicates too many fields were sent in the request. -------------------------------------------------------------------------------- LimitRequestFieldsize directive Syntax: LimitRequestFieldsize number Default: LimitRequestFieldsize 8190 Context: server config Status: core Compatibility: LimitRequestFieldsize is only available in Apache 1.3.2 and later. Number is an integer size in bytes from 0 to the value of the compile-time constant DEFAULT_LIMIT_REQUEST_FIELDSIZE (8190 as distributed). The LimitRequestFieldsize directive allows the server administrator to reduce the limit on the allowed size of an HTTP request header field below the normal input buffer size compiled with the server. A server needs this value to be large enough to hold any one header field from a normal client request. The size of a normal request header field will vary greatly among different client implementations, often depending upon the extent to which a user has configured their browser to support detailed content negotiation. This directive gives the server administrator greater control over abnormal client request behavior, which may be useful for avoiding some forms of denial-of-service attacks. Under normal conditions, the value should not be changed from the default. -------------------------------------------------------------------------------- LimitRequestLine directive Syntax: LimitRequestLine number Default: LimitRequestLine 8190 Context: server config Status: core Compatibility: LimitRequestLine is only available in Apache 1.3.2 and later. Number is an integer size in bytes from 0 to the value of the compile-time constant DEFAULT_LIMIT_REQUEST_LINE (8190 as distributed). The LimitRequestLine directive allows the server administrator to reduce the limit on the allowed size of a clients HTTP request-line below the normal input buffer size compiled with the server. Since the request-line consists of the HTTP method, URI, and protocol version, the LimitRequestLine directive places a restriction on the length of a request-URI allowed for a request on the server. A server needs this value to be large enough to hold any of its resource names, including any information that might be passed in the query part of a GET request. This directive gives the server administrator greater control over abnormal client request behavior, which may be useful for avoiding some forms of denial-of-service attacks. Under normal conditions, the value should not be changed from the default. -------------------------------------------------------------------------------- Listen directive Syntax: Listen [IP address:]port number Context: server config Status: core Compatibility: Listen is only available in Apache 1.1 and later. The Listen directive instructs Apache to listen to more than one IP address or port; by default it responds to requests on all IP interfaces, but only on the port given by the Port directive. Listen can be used instead of BindAddress and Port. It tells the server to accept incoming requests on the specified port or address-and-port combination. If the first format is used, with a port number only, the server listens to the given port on all interfaces, instead of the port given by the Port directive. If an IP address is given as well as a port, the server wi

www.bkjia.comtruehttp://www.bkjia.com/PHPjc/531760.htmlTechArticleKeepAliveTimeout directive Syntax: KeepAliveTimeout seconds Default: KeepAliveTimeout 15 Context: server config Status: Core Compatibility: KeepAliveTimeout is only available in Ap...
Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Article

R.E.P.O. Energy Crystals Explained and What They Do (Yellow Crystal)
2 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
Hello Kitty Island Adventure: How To Get Giant Seeds
1 months ago By 尊渡假赌尊渡假赌尊渡假赌
Two Point Museum: All Exhibits And Where To Find Them
1 months ago By 尊渡假赌尊渡假赌尊渡假赌

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

SEC seeks $5.3 billion fine against Terraform Labs and Do Kwon SEC seeks $5.3 billion fine against Terraform Labs and Do Kwon Apr 24, 2024 pm 03:25 PM

The agency is also seeking conduct-based and "compliance with the law" injunctions. The U.S. Securities and Exchange Commission (SEC) wants to fine Terraform Labs and its former CEO DoKwon nearly $5.3 billion for violations of U.S. securities laws and fraud charges. The agency detailed its requested fine in an April 19 legal filing. The SEC is primarily seeking $4.2 billion in disgorgement and $545.7 million in prejudgment interest. The purpose of the illegally obtained proceeds is to force TerraformLabs and Kwon to return the unfair benefits they obtained between June 2021 and May 2022 through the following channels: first, selling tokens to institutional investors; second, through their relationship with Genesi

The U.S. spot ETH ETF listing plan is postponed, and the SEC requires a revised S-1 form to be submitted before July 8 The U.S. spot ETH ETF listing plan is postponed, and the SEC requires a revised S-1 form to be submitted before July 8 Jun 30, 2024 pm 08:38 PM

U.S. Spot Ethereum ETF Launch Delayed The U.S. Securities and Exchange Commission (SEC) has delayed the launch of its spot Ethereum exchange-traded fund (ETH ETF) and required issuers to resubmit Form S-1 before July 8. This decision has resulted in the postponement of the planned launch on July 2, with the new launch expected to be in mid-July or later. Background Overview There has been a change in the review process for spot Ethereum ETFs, with Bloomberg’s senior ETF analyst Eric Balchunas commenting on the SEC’s latest decision and its impact on market expectations. Earlier last month, SEC Chairman Gary Gensler

The SEC Temporarily Suspends Its Allegations That SOL, ADA, and MATIC Are Unregistered Securities The SEC Temporarily Suspends Its Allegations That SOL, ADA, and MATIC Are Unregistered Securities Jul 31, 2024 am 12:25 AM

This decision comes amid the ongoing legal proceedings against Binance, one of the world's leading cryptocurrency exchanges.

In this article, learn about SEC and Fidelity talking about open staking for crypto ETFs! Discussing ETF staking, stablecoins and DeFi regulation In this article, learn about SEC and Fidelity talking about open staking for crypto ETFs! Discussing ETF staking, stablecoins and DeFi regulation Mar 04, 2025 am 11:09 AM

The minutes recently released by the Securities and Exchange Commission (SEC) show that the SEC Cryptocurrency Working Group (CTF) has held talks with Fidelity Investment and MITRE to discuss many key issues in crypto asset regulation. SEC and Fidelity: Pledge of crypto ETFs and related rules At this meeting, SEC and asset management giant Fidelity had in-depth exchanges on the issue of crypto asset supervision. Discussions cover: Customer protection rules related to brokerage dealers' interaction with digital asset securities (Rule15c3-3). Formulate standardized listing rules for digital asset exchange-traded products (ETPs). Clarify ETF pledged assets and operating specifications. Monitoring of blockchain tokens and financial instrument-related rewards (such as pledge income, liquidity mining)

Why Cancelled SEC vs Ripple Meeting Shouldn't Worry XRP Holders Why Cancelled SEC vs Ripple Meeting Shouldn't Worry XRP Holders Aug 01, 2024 pm 10:02 PM

The U.S. Securities and Exchange Commission (SEC) has cancelled a closed-door meeting that was initially scheduled for today at 2 PM Washington time.

The SEC No Longer Asks the Court to Deem the Tokens Named in Its Lawsuit against Binance as Securities The SEC No Longer Asks the Court to Deem the Tokens Named in Its Lawsuit against Binance as Securities Jul 30, 2024 pm 06:29 PM

The United States Securities and Exchange Commission (SEC) no longer asks the court to decide and deem the tokens named in its lawsuit against the crypto exchange

Source: SEC is very interested in staking! Or promote the revival of Ethereum? Source: SEC is very interested in staking! Or promote the revival of Ethereum? Mar 04, 2025 am 09:57 AM

The U.S. Securities and Exchange Commission approved the Ethereum spot ETF in July last year, but its performance was worse than expected. One reason is that traditional institutions have limited understanding of Ethereum, and more importantly, existing Ethereum spot ETFs have failed to fully utilize their advantages - open staking to obtain stable returns. However, according to a message posted on social media X by ETFStore President Nate Geraci, the SEC has confirmed the 19b-4 application for staking of 21 SharesCoreEthereum ETF submitted by Cboe. SEC is very interested in the pledge mechanism Fox Business News reporter Eleanor Terrett quoted sources as saying that the SEC is currently very concerned about the pledge mechanism and has even asked the industry to

SEC sets up a new department CETU! Targeted to combat AI fraud, blockchain and cryptocurrency crimes SEC sets up a new department CETU! Targeted to combat AI fraud, blockchain and cryptocurrency crimes Mar 04, 2025 am 11:54 AM

The Securities and Exchange Commission (SEC) officially launched the "Cyber ​​and Emerging Technology Division" (CETU) on February 20, 2025, aiming to combat cybersecurity-related violations and protect investors from fraud in emerging technology fields. The department, led by Laura D'Allaird, integrates resources from the original crypto assets and networking department and brings together about 30 experts from various SEC departments. SEC Acting Chairman Mark T.Uyeda said that CETU will work with the cryptoasset task force to ensure the effective allocation of law enforcement resources, with the goal of protecting investors, promoting capital formation, maintaining market efficiency, and supporting innovative and healthy development. CETU focuses on combating areas: artificial intelligence fraud, social media fraud, blockchain

See all articles