首页 php教程 php手册 ApacheReferenceManual6

ApacheReferenceManual6

Jun 13, 2016 am 10:28 AM
directive sec syntax

KeepAliveTimeout directive Syntax: KeepAliveTimeout seconds Default: KeepAliveTimeout 15 Context: server config Status: Core Compatibility: KeepAliveTimeout is only available in Apache 1.1 and later. The number of seconds Apache will wait for a subsequent request before closing the connection. Once a request has been received, the timeout value specified by the Timeout directive applies. -------------------------------------------------------------------------------- directive Syntax: ... Context: any Status: core Access controls are normally effective for all access methods, and this is the usual desired behaviour. In the general case, access control directives should not be placed within a section. The purpose of the directive is to restrict the effect of the access controls to the nominated HTTP methods. For all other methods, the access restrictions that are enclosed in the bracket will have no effect. The following example applies the access control only to the methods POST, PUT, and DELETE, leaving all other methods unprotected: require valid-user The method names listed can be one or more of: GET, POST, PUT, DELETE, CONNECT, OPTIONS, TRACE, PATCH, PROPFIND, PROPPATCH, MKCOL, COPY, MOVE, LOCK, and UNLOCK. The method name is case-sensitive. If GET is used it will also restrict HEAD requests. -------------------------------------------------------------------------------- directive Syntax: ... Context: any Status: core Compatibility: Available in Apache 1.3.5 and later and are used to enclose a group of access control directives which will then apply to any HTTP access method not listed in the arguments; i.e., it is the opposite of a section and can be used to control both standard and nonstandard/unrecognized methods. See the documentation for for more details. -------------------------------------------------------------------------------- LimitRequestBody directive Syntax: LimitRequestBody number Default: LimitRequestBody 0 Context: server config, virtual host, directory, .htaccess Status: core Compatibility: LimitRequestBody is only available in Apache 1.3.2 and later. Number is a long integer from 0 (meaning unlimited) to 2147483647 (2GB). The default value is defined by the compile-time constant DEFAULT_LIMIT_REQUEST_BODY (0 as distributed). The LimitRequestBody directive allows the user to set a limit on the allowed size of an HTTP request message body within the context in which the directive is given (server, per-directory, per-file or per-location). If the client request exceeds that limit, the server will return an error response instead of servicing the request. The size of a normal request message body will vary greatly depending on the nature of the resource and the methods allowed on that resource. CGI scripts typically use the message body for passing form information to the server. Implementations of the PUT method will require a value at least as large as any representation that the server wishes to accept for that resource. This directive gives the server administrator greater control over abnormal client request behavior, which may be useful for avoiding some forms of denial-of-service attacks. -------------------------------------------------------------------------------- LimitRequestFields directive Syntax: LimitRequestFields number Default: LimitRequestFields 100 Context: server config Status: core Compatibility: LimitRequestFields is only available in Apache 1.3.2 and later. Number is an integer from 0 (meaning unlimited) to 32767. The default value is defined by the compile-time constant DEFAULT_LIMIT_REQUEST_FIELDS (100 as distributed). The LimitRequestFields directive allows the server administrator to modify the limit on the number of request header fields allowed in an HTTP request. A server needs this value to be larger than the number of fields that a normal client request might include. The number of request header fields used by a client rarely exceeds 20, but this may vary among different client implementations, often depending upon the extent to which a user has configured their browser to support detailed content negotiation. Optional HTTP extensions are often expressed using request header fields. This directive gives the server administrator greater control over abnormal client request behavior, which may be useful for avoiding some forms of denial-of-service attacks. The value should be increased if normal clients see an error response from the server that indicates too many fields were sent in the request. -------------------------------------------------------------------------------- LimitRequestFieldsize directive Syntax: LimitRequestFieldsize number Default: LimitRequestFieldsize 8190 Context: server config Status: core Compatibility: LimitRequestFieldsize is only available in Apache 1.3.2 and later. Number is an integer size in bytes from 0 to the value of the compile-time constant DEFAULT_LIMIT_REQUEST_FIELDSIZE (8190 as distributed). The LimitRequestFieldsize directive allows the server administrator to reduce the limit on the allowed size of an HTTP request header field below the normal input buffer size compiled with the server. A server needs this value to be large enough to hold any one header field from a normal client request. The size of a normal request header field will vary greatly among different client implementations, often depending upon the extent to which a user has configured their browser to support detailed content negotiation. This directive gives the server administrator greater control over abnormal client request behavior, which may be useful for avoiding some forms of denial-of-service attacks. Under normal conditions, the value should not be changed from the default. -------------------------------------------------------------------------------- LimitRequestLine directive Syntax: LimitRequestLine number Default: LimitRequestLine 8190 Context: server config Status: core Compatibility: LimitRequestLine is only available in Apache 1.3.2 and later. Number is an integer size in bytes from 0 to the value of the compile-time constant DEFAULT_LIMIT_REQUEST_LINE (8190 as distributed). The LimitRequestLine directive allows the server administrator to reduce the limit on the allowed size of a clients HTTP request-line below the normal input buffer size compiled with the server. Since the request-line consists of the HTTP method, URI, and protocol version, the LimitRequestLine directive places a restriction on the length of a request-URI allowed for a request on the server. A server needs this value to be large enough to hold any of its resource names, including any information that might be passed in the query part of a GET request. This directive gives the server administrator greater control over abnormal client request behavior, which may be useful for avoiding some forms of denial-of-service attacks. Under normal conditions, the value should not be changed from the default. -------------------------------------------------------------------------------- Listen directive Syntax: Listen [IP address:]port number Context: server config Status: core Compatibility: Listen is only available in Apache 1.1 and later. The Listen directive instructs Apache to listen to more than one IP address or port; by default it responds to requests on all IP interfaces, but only on the port given by the Port directive. Listen can be used instead of BindAddress and Port. It tells the server to accept incoming requests on the specified port or address-and-port combination. If the first format is used, with a port number only, the server listens to the given port on all interfaces, instead of the port given by the Port directive. If an IP address is given as well as a port, the server wi

本站声明
本文内容由网友自发贡献,版权归原作者所有,本站不承担相应法律责任。如您发现有涉嫌抄袭侵权的内容,请联系admin@php.cn

热AI工具

Undresser.AI Undress

Undresser.AI Undress

人工智能驱动的应用程序,用于创建逼真的裸体照片

AI Clothes Remover

AI Clothes Remover

用于从照片中去除衣服的在线人工智能工具。

Undress AI Tool

Undress AI Tool

免费脱衣服图片

Clothoff.io

Clothoff.io

AI脱衣机

AI Hentai Generator

AI Hentai Generator

免费生成ai无尽的。

热门文章

R.E.P.O.能量晶体解释及其做什么(黄色晶体)
1 个月前 By 尊渡假赌尊渡假赌尊渡假赌
R.E.P.O.最佳图形设置
1 个月前 By 尊渡假赌尊渡假赌尊渡假赌
威尔R.E.P.O.有交叉游戏吗?
1 个月前 By 尊渡假赌尊渡假赌尊渡假赌

热工具

记事本++7.3.1

记事本++7.3.1

好用且免费的代码编辑器

SublimeText3汉化版

SublimeText3汉化版

中文版,非常好用

禅工作室 13.0.1

禅工作室 13.0.1

功能强大的PHP集成开发环境

Dreamweaver CS6

Dreamweaver CS6

视觉化网页开发工具

SublimeText3 Mac版

SublimeText3 Mac版

神级代码编辑软件(SublimeText3)

美国现货ETH ETF上市计划推迟,SEC要求7月8日前提交修订S-1表格 美国现货ETH ETF上市计划推迟,SEC要求7月8日前提交修订S-1表格 Jun 30, 2024 pm 08:38 PM

美国现货以太坊 ETF 推出时间延期美国证券交易委员会(SEC)将现货以太坊交易所交易基金(ETH ETF)的推出时间推迟,并要求发行人在 7 月 8 日前重新提交 S-1 表格。这一决定导致原定于 7 月 2 日的上市计划被迫延后,预计新的上市时间将在 7 月中旬或更晚。背景概述针对现货以太坊 ETF 的审查进程出现了变动,彭博社的高级 ETF 分析师 Eric Balchunas 发表了评论,指出了 SEC 的最新决定及其对市场预期的影响。此前,SEC 主席 Gary Gensler 上个月

SEC 寻求对 Terraform Labs 和 Do Kwon 处以 53亿美元的罚款 SEC 寻求对 Terraform Labs 和 Do Kwon 处以 53亿美元的罚款 Apr 24, 2024 pm 03:25 PM

该机构还寻求基于行为的和“遵守法律”的禁令。美国证券交易委员会(SEC)希望对TerraformLabs及其前首席执行官DoKwon处以近53亿美元的罚款,罪名是违反美国证券法和欺诈指控。该机构在4月19日的法律文件中详细说明了其要求的罚款。SEC主要寻求42亿美元的非法所得收益以及5.457亿美元的判决前利息。非法所得收益的目的在于迫使TerraformLabs和Kwon归还他们在2021年6月至2022年5月期间通过以下途径所获得的不公正利益:一是向机构投资者出售代币;二是通过与Genesi

SEC 暂时中止对 SOL、ADA 和 MATIC 为未注册证券的指控 SEC 暂时中止对 SOL、ADA 和 MATIC 为未注册证券的指控 Jul 31, 2024 am 12:25 AM

这一决定是在针对全球领先的加密货币交易所之一币安的法律诉讼正在进行中做出的。

一文了解SEC与富达谈论加密ETF开放质押!探讨ETF质押、稳定币与DeFi监管 一文了解SEC与富达谈论加密ETF开放质押!探讨ETF质押、稳定币与DeFi监管 Mar 04, 2025 am 11:09 AM

美国证券交易委员会(SEC)近日公布的会议记录显示,SEC加密货币工作组(CTF)已分别与富达投资和MITRE公司进行了会谈,探讨加密资产监管的诸多关键议题。SEC与富达:加密ETF质押及相关规则此次会议,SEC与资产管理巨头富达就加密资产监管问题进行了深入交流。讨论内容涵盖:经纪交易商与数字资产证券互动相关的客户保护规则(Rule15c3-3)。制定标准化的数字资产交易所交易产品(ETP)上市规则。明确ETF质押资产及操作规范。区块链代币及金融工具相关奖励(如质押收益、流动性挖矿)的监

为什么取消 SEC 与 Ripple 会议不应让 XRP 持有者担心 为什么取消 SEC 与 Ripple 会议不应让 XRP 持有者担心 Aug 01, 2024 pm 10:02 PM

美国证券交易委员会 (SEC) 取消了原定于华盛顿时间今天下午 2 点举行的闭门会议。

美国证券交易委员会不再要求法院将其针对币安的诉讼中指定的代币视为证券 美国证券交易委员会不再要求法院将其针对币安的诉讼中指定的代币视为证券 Jul 30, 2024 pm 06:29 PM

美国证券交易委员会(SEC)不再要求法院裁决和认定其针对加密货币交易所的诉讼中提到的代币

SEC 针对 Uniswap 发出威尔斯通知,涉及证券法规问题 SEC 针对 Uniswap 发出威尔斯通知,涉及证券法规问题 Apr 11, 2024 pm 02:58 PM

威尔斯通知通常是在诉讼前发出的预备步骤。美国证券交易委员会(SEC)向UniswapLabs发出了威尔斯通知,该公司是基于于以太坊链为基础的去中心化交易所Uniswap的运营实体。关于威尔斯通知威尔斯通知(WellsNotice)是美国证券交易委员会(SEC)在准备对个人或公司采取执法行动前发出的一种正式通知。这种通知标志着监管机构已经完成了调查,并发现了违规行为,通知的接收方有机会在正式的执法行动开始之前提出异议或进行解释。虽然威尔斯通知不是法律要求的必要程序,但SEC和美国证券交易商协会(N

为加强加密货币监管,尼日利亚SEC启动30天注册期限 为加强加密货币监管,尼日利亚SEC启动30天注册期限 Jun 22, 2024 pm 10:59 PM

尼日利亚证券交易委员会(SEC)最近推出了一个新的注册计划,目的是加速虚拟资产服务提供商(VASP)的注册流程。据这个西非国家的证券市场监管机构称,此举是对现有规则的重要修正,目的是让监管框架与时俱进,适应加密货币生态系统的日益复杂性。尼日利亚SEC设定30天期限以加速VASP注册今年3月,尼日利亚SEC宣布了对数字资产发行、发行平台、交易和托管规则的修改,其中最引人注目的是将VASP的注册费从3000万奈拉(约合20,161美元)提高至1.5亿奈拉(约合100,806美元)。这一变化引发了业界

See all articles