백엔드 개발 PHP 튜토리얼 ApacheReferenceManual6_PHP教程

ApacheReferenceManual6_PHP教程

Jul 13, 2016 pm 05:28 PM
directive sec syntax

KeepAliveTimeout directive Syntax: KeepAliveTimeout seconds Default: KeepAliveTimeout 15 Context: server config Status: Core Compatibility: KeepAliveTimeout is only available in Apache 1.1 and later. The number of seconds Apache will wait for a subsequent request before closing the connection. Once a request has been received, the timeout value specified by the Timeout directive applies. -------------------------------------------------------------------------------- directive Syntax: ... Context: any Status: core Access controls are normally effective for all access methods, and this is the usual desired behaviour. In the general case, access control directives should not be placed within a section. The purpose of the directive is to restrict the effect of the access controls to the nominated HTTP methods. For all other methods, the access restrictions that are enclosed in the bracket will have no effect. The following example applies the access control only to the methods POST, PUT, and DELETE, leaving all other methods unprotected: require valid-user The method names listed can be one or more of: GET, POST, PUT, DELETE, CONNECT, OPTIONS, TRACE, PATCH, PROPFIND, PROPPATCH, MKCOL, COPY, MOVE, LOCK, and UNLOCK. The method name is case-sensitive. If GET is used it will also restrict HEAD requests. -------------------------------------------------------------------------------- directive Syntax: ... Context: any Status: core Compatibility: Available in Apache 1.3.5 and later and are used to enclose a group of access control directives which will then apply to any HTTP access method not listed in the arguments; i.e., it is the opposite of a section and can be used to control both standard and nonstandard/unrecognized methods. See the documentation for for more details. -------------------------------------------------------------------------------- LimitRequestBody directive Syntax: LimitRequestBody number Default: LimitRequestBody 0 Context: server config, virtual host, directory, .htaccess Status: core Compatibility: LimitRequestBody is only available in Apache 1.3.2 and later. Number is a long integer from 0 (meaning unlimited) to 2147483647 (2GB). The default value is defined by the compile-time constant DEFAULT_LIMIT_REQUEST_BODY (0 as distributed). The LimitRequestBody directive allows the user to set a limit on the allowed size of an HTTP request message body within the context in which the directive is given (server, per-directory, per-file or per-location). If the client request exceeds that limit, the server will return an error response instead of servicing the request. The size of a normal request message body will vary greatly depending on the nature of the resource and the methods allowed on that resource. CGI scripts typically use the message body for passing form information to the server. Implementations of the PUT method will require a value at least as large as any representation that the server wishes to accept for that resource. This directive gives the server administrator greater control over abnormal client request behavior, which may be useful for avoiding some forms of denial-of-service attacks. -------------------------------------------------------------------------------- LimitRequestFields directive Syntax: LimitRequestFields number Default: LimitRequestFields 100 Context: server config Status: core Compatibility: LimitRequestFields is only available in Apache 1.3.2 and later. Number is an integer from 0 (meaning unlimited) to 32767. The default value is defined by the compile-time constant DEFAULT_LIMIT_REQUEST_FIELDS (100 as distributed). The LimitRequestFields directive allows the server administrator to modify the limit on the number of request header fields allowed in an HTTP request. A server needs this value to be larger than the number of fields that a normal client request might include. The number of request header fields used by a client rarely exceeds 20, but this may vary among different client implementations, often depending upon the extent to which a user has configured their browser to support detailed content negotiation. Optional HTTP extensions are often expressed using request header fields. This directive gives the server administrator greater control over abnormal client request behavior, which may be useful for avoiding some forms of denial-of-service attacks. The value should be increased if normal clients see an error response from the server that indicates too many fields were sent in the request. -------------------------------------------------------------------------------- LimitRequestFieldsize directive Syntax: LimitRequestFieldsize number Default: LimitRequestFieldsize 8190 Context: server config Status: core Compatibility: LimitRequestFieldsize is only available in Apache 1.3.2 and later. Number is an integer size in bytes from 0 to the value of the compile-time constant DEFAULT_LIMIT_REQUEST_FIELDSIZE (8190 as distributed). The LimitRequestFieldsize directive allows the server administrator to reduce the limit on the allowed size of an HTTP request header field below the normal input buffer size compiled with the server. A server needs this value to be large enough to hold any one header field from a normal client request. The size of a normal request header field will vary greatly among different client implementations, often depending upon the extent to which a user has configured their browser to support detailed content negotiation. This directive gives the server administrator greater control over abnormal client request behavior, which may be useful for avoiding some forms of denial-of-service attacks. Under normal conditions, the value should not be changed from the default. -------------------------------------------------------------------------------- LimitRequestLine directive Syntax: LimitRequestLine number Default: LimitRequestLine 8190 Context: server config Status: core Compatibility: LimitRequestLine is only available in Apache 1.3.2 and later. Number is an integer size in bytes from 0 to the value of the compile-time constant DEFAULT_LIMIT_REQUEST_LINE (8190 as distributed). The LimitRequestLine directive allows the server administrator to reduce the limit on the allowed size of a clients HTTP request-line below the normal input buffer size compiled with the server. Since the request-line consists of the HTTP method, URI, and protocol version, the LimitRequestLine directive places a restriction on the length of a request-URI allowed for a request on the server. A server needs this value to be large enough to hold any of its resource names, including any information that might be passed in the query part of a GET request. This directive gives the server administrator greater control over abnormal client request behavior, which may be useful for avoiding some forms of denial-of-service attacks. Under normal conditions, the value should not be changed from the default. -------------------------------------------------------------------------------- Listen directive Syntax: Listen [IP address:]port number Context: server config Status: core Compatibility: Listen is only available in Apache 1.1 and later. The Listen directive instructs Apache to listen to more than one IP address or port; by default it responds to requests on all IP interfaces, but only on the port given by the Port directive. Listen can be used instead of BindAddress and Port. It tells the server to accept incoming requests on the specified port or address-and-port combination. If the first format is used, with a port number only, the server listens to the given port on all interfaces, instead of the port given by the Port directive. If an IP address is given as well as a port, the server wi

www.bkjia.comtruehttp://www.bkjia.com/PHPjc/531760.htmlTechArticleKeepAliveTimeout directive Syntax: KeepAliveTimeout seconds Default: KeepAliveTimeout 15 Context: server config Status: Core Compatibility: KeepAliveTimeout is only available in Ap...
본 웹사이트의 성명
본 글의 내용은 네티즌들의 자발적인 기여로 작성되었으며, 저작권은 원저작자에게 있습니다. 본 사이트는 이에 상응하는 법적 책임을 지지 않습니다. 표절이나 침해가 의심되는 콘텐츠를 발견한 경우 admin@php.cn으로 문의하세요.

뜨거운 기사 태그

메모장++7.3.1

메모장++7.3.1

사용하기 쉬운 무료 코드 편집기

SublimeText3 중국어 버전

SublimeText3 중국어 버전

중국어 버전, 사용하기 매우 쉽습니다.

스튜디오 13.0.1 보내기

스튜디오 13.0.1 보내기

강력한 PHP 통합 개발 환경

드림위버 CS6

드림위버 CS6

시각적 웹 개발 도구

SublimeText3 Mac 버전

SublimeText3 Mac 버전

신 수준의 코드 편집 소프트웨어(SublimeText3)

SEC, Terraform Labs와 Do Kwon을 상대로 53억 달러 벌금 청구 SEC, Terraform Labs와 Do Kwon을 상대로 53억 달러 벌금 청구 Apr 24, 2024 pm 03:25 PM

SEC, Terraform Labs와 Do Kwon을 상대로 53억 달러 벌금 청구

미국 현물 ETH ETF 상장 계획이 연기되고, SEC는 수정된 S-1 양식을 7월 8일 이전에 제출하도록 요구합니다. 미국 현물 ETH ETF 상장 계획이 연기되고, SEC는 수정된 S-1 양식을 7월 8일 이전에 제출하도록 요구합니다. Jun 30, 2024 pm 08:38 PM

미국 현물 ETH ETF 상장 계획이 연기되고, SEC는 수정된 S-1 양식을 7월 8일 이전에 제출하도록 요구합니다.

이 기사에서는 Crypto ETF의 열린 스테이 킹에 대해 SEC와 Fidelity에 대해 배우십시오! ETF 스테이 킹, 스테이 블 레코 인 및 결함 규정에 대한 논의 이 기사에서는 Crypto ETF의 열린 스테이 킹에 대해 SEC와 Fidelity에 대해 배우십시오! ETF 스테이 킹, 스테이 블 레코 인 및 결함 규정에 대한 논의 Mar 04, 2025 am 11:09 AM

이 기사에서는 Crypto ETF의 열린 스테이 킹에 대해 SEC와 Fidelity에 대해 배우십시오! ETF 스테이 킹, 스테이 블 레코 인 및 결함 규정에 대한 논의

SEC는 SOL, ADA 및 MATIC이 미등록 증권이라는 주장을 일시적으로 유보합니다. SEC는 SOL, ADA 및 MATIC이 미등록 증권이라는 주장을 일시적으로 유보합니다. Jul 31, 2024 am 12:25 AM

SEC는 SOL, ADA 및 MATIC이 미등록 증권이라는 주장을 일시적으로 유보합니다.

취소된 SEC 대 리플 회의가 XRP 보유자를 걱정해서는 안 되는 이유 취소된 SEC 대 리플 회의가 XRP 보유자를 걱정해서는 안 되는 이유 Aug 01, 2024 pm 10:02 PM

취소된 SEC 대 리플 회의가 XRP 보유자를 걱정해서는 안 되는 이유

SEC는 더 이상 법원에 바이낸스를 상대로 한 소송에서 언급된 토큰을 증권으로 간주하도록 요청하지 않습니다. SEC는 더 이상 법원에 바이낸스를 상대로 한 소송에서 언급된 토큰을 증권으로 간주하도록 요청하지 않습니다. Jul 30, 2024 pm 06:29 PM

SEC는 더 이상 법원에 바이낸스를 상대로 한 소송에서 언급된 토큰을 증권으로 간주하도록 요청하지 않습니다.

출처 : SEC는 스테이 킹에 매우 관심이 있습니다! 아니면 이더 리움의 부흥을 장려합니까? 출처 : SEC는 스테이 킹에 매우 관심이 있습니다! 아니면 이더 리움의 부흥을 장려합니까? Mar 04, 2025 am 09:57 AM

출처 : SEC는 스테이 킹에 매우 관심이 있습니다! 아니면 이더 리움의 부흥을 장려합니까?

SEC는 새로운 부서 CETU를 설정합니다! AI 사기, 블록 체인 및 암호 화폐 범죄와 싸우기위한 대상 SEC는 새로운 부서 CETU를 설정합니다! AI 사기, 블록 체인 및 암호 화폐 범죄와 싸우기위한 대상 Mar 04, 2025 am 11:54 AM

SEC는 새로운 부서 CETU를 설정합니다! AI 사기, 블록 체인 및 암호 화폐 범죄와 싸우기위한 대상

See all articles