This directive controls whether requests that contain trailing pathname information that follows an actual filename (or non-existent file in an existing directory) will be accepted or rejected. The trailing pathname information can be made available to scripts in the PATH_INFO environment variable.
For example, assume the location /test/ points to
a directory that contains only the single file
here.html. Then requests for
/test/here.html/more and
/test/nothere.html/more both collect
/more as PATH_INFO.
The three possible arguments for the
off/test/here.html/more in the above example will return
a 404 NOT FOUND error.on/test/here.html/more will be accepted if
/test/here.html maps to a valid file.defaultThe primary purpose of the AcceptPathInfo
directive is to allow you to override the handler's choice of
accepting or rejecting PATH_INFO. This override is required, for
example, when you use a filter, such
as INCLUDES, to generate content
based on PATH_INFO. The core handler would usually reject the
request, so you can use the following configuration to enable
such a script:
When returning a document to the client the server looks for the first existing access control file from this list of names in every directory of the path to the document, if access control files are enabled for that directory. For example:
before returning the document
/usr/local/web/index.html, the server will read
/.acl, /usr/.acl,
/usr/local/.acl and /usr/local/web/.acl
for directives, unless they have been disabled with
This directive specifies the name of the character set that
will be added to any response that does not have any parameter on
the content type in the HTTP headers. This will override any
character set specified in the body of the document via a
META tag. A setting of AddDefaultCharset
Off disables this
functionality. AddDefaultCharset On enables
Apache's internal default charset of iso-8859-1 as
required by the directive. You can also specify an alternate
charset to be used. For example:
The server can have modules compiled in which are not
actively in use. This directive can be used to enable the use
of those modules. The server comes with a pre-loaded list of
active modules; this list can be cleared with the
For example:
When the server finds an .htaccess file (as specified by
When this directive is set to None, then
.htaccess files are completely ignored. In this case, the
server will not even attempt to read .htaccess files in the
filesystem.
When this directive is set to All, then any
directive which has the .htaccess Context is allowed in
.htaccess files.
The directive-type can be one of the following groupings of directives.
Example:
This directive sets the name of the authorization realm for a
directory. This realm is given to the client so that the user
knows which username and password to send.
For example:
The string provided for the AuthRealm is what will
appear in the password dialog provided by most browsers.
This directive selects the type of user authentication for a
directory. Only Basic and Digest are
currently implemented.
It must be accompanied by
This directive enables the generation of
Content-MD5 headers as defined in RFC1864
respectively RFC2068.
MD5 is an algorithm for computing a "message digest" (sometimes called "fingerprint") of arbitrary-length data, with a high degree of confidence that any alterations in the data will be reflected in alterations in the message digest.
The Content-MD5 header provides an end-to-end
message integrity check (MIC) of the entity-body. A proxy or
client may check this header for detecting accidental
modification of the entity-body in transit. Example header:
Note that this can cause performance problems on your server since the message digest is computed on every request (the values are not cached).
Content-MD5 is only sent for documents served
by the core, and not by any module. For example, SSI documents,
output from CGI scripts, and byte range responses do not have
this header.
There will be times when the server is asked to provide a document whose type cannot be determined by its MIME types mappings.
The server must inform the client of the content-type of the
document, so in the event of an unknown type it uses the
DefaultType. For example:
DefaultType image/gif
would be appropriate for a directory which contained many gif images with filenames missing the .gif extension.
Note that unlike
</Directory> are used to enclose a group of
directives which will apply only to the named directory and
sub-directories of that directory. Any directive which is allowed
in a directory context may be used. Directory-path is
either the full path to a directory, or a wild-card string. In a
wild-card string, `?' matches any single character, and `*'
matches any sequences of characters. You may
also use `[]' character ranges like in the shell. Also as of
Apache 1.3 none of the wildcards match a `/' character, which more
closely mimics the behavior of Unix shells. Example:
Extended regular
expressions can also be used, with the addition of the
~ character. For example:
would match directories in /www/ that consisted of three numbers.
If multiple (non-regular expression) directory sections match the directory (or its parents) containing a document, then the directives are applied in the order of shortest match first, interspersed with the directives from the .htaccess files. For example, with
for access to the document /home/web/dir/doc.html
the steps are:
AllowOverride None
(disabling .htaccess files).AllowOverride FileInfo (for
directory /home/web)./home/web/.htaccessRegular expressions are not considered until after all of the normal sections have been applied. Then all of the regular expressions are tested in the order they appeared in the configuration file. For example, with
The regular expression section won't be considered until after
all normal <Directory>s and .htaccess files
have been applied. Then the regular expression will match on
/home/abc/public_html/abc and be applied.
Note that the default Apache access for
<Directory /> is Allow from All. This means
that Apache will serve any file mapped from an URL. It is
recommended that you change this with a block such
as
and then override this for directories you want accessible. See the Security Tips page for more details.
The directory sections typically occur in
the access.conf file, but they may appear in any configuration
file.
</DirectoryMatch> are used to enclose a group
of directives which will apply only to the named directory and
sub-directories of that directory, the same as
would match directories in /www/ that consisted of three
numbers.
<Directory>sThis directive sets the directory from which httpd will serve files. Unless matched by a directive like Alias, the server appends the path from the requested URL to the document root to make the path to the document. Example:
then an access to
http://www.my.host.com/index.html refers to
/usr/web/index.html.
The
In the event of a problem or error, Apache can be configured to do one of four things,
The first option is the default, while options 2-4 are
configured using the
URLs can begin with a slash (/) for local URLs, or be a full URL which the client can resolve. Alternatively, a message can be provided to be displayed by the browser. Examples:
Note that when you specify an ErrorDocument 401, the client will not
know to prompt the user for a password since it will not
receive the 401 status code. Therefore, if you use an
"ErrorDocument 401" directive then it must refer to a local
document.
Prior to version 2.0, messages were indicated by prefixing them with a single unmatched double quote character.
The
Using syslog instead of a filename enables logging
via syslogd(8) if the system supports it. The default is to use
syslog facility local7, but you can override this by
using the syslog:facility syntax where
facility can be one of the names usually documented in
syslog(1).
SECURITY: See the security tips document for details on why your security could be compromised if the directory where logfiles are stored is writable by anyone other than the user that starts the server.
The
FileETag INode MTime Size')The INode, MTime, and Size keywords may be prefixed with either '+' or '-', which allow changes to be made to the default setting inherited from a broader scope. Any keyword appearing without such a prefix immediately and completely cancels the inherited setting.
If a directory's configuration includes
'FileETag INode MTime Size', and a
subdirectory's includes 'FileETag -INode',
the setting for that subdirectory (which will be inherited by
any sub-subdirectories that don't override it) will be equivalent to
'FileETag MTime Size'.
The </Files> directive. The
directives given within this section will be applied to any object
with a basename (last component of filename) matching the
specified filename. .htaccess files are read, but before
The filename argument should include a filename, or
a wild-card string, where `?' matches any single character, and
`*' matches any sequences of characters. Extended regular
expressions can also be used, with the addition of the
~ character. For example:
would match most common Internet graphics formats. In Apache 1.3
and later,
Note that unlike
The
would match most common Internet graphics formats.
When placed into an .htaccess file or a
Note that unlike
This directive enables DNS lookups so that host names can be
logged (and passed to CGIs/SSIs in REMOTE_HOST).
The value double refers to doing double-reverse
DNS. That is, after a reverse lookup is performed, a forward
lookup is then performed on that result. At least one of the ip
addresses in the forward lookup must match the original
address. (In "tcpwrappers" terminology this is called
PARANOID.)
Regardless of the setting, when HostnameLookups double. For example, if only
HostnameLookups on and a request is made to an object
that is protected by hostname restrictions, regardless of whether
the double-reverse fails or not, CGIs will still be passed the
single-reverse result in REMOTE_HOST.
The default is off in order to save the network
traffic for those sites that don't truly need the reverse
lookups done. It is also better for the end users because they
don't have to suffer the extra latency that a lookup entails.
Heavily loaded sites should leave this directive
off, since DNS lookups can take considerable
amounts of time. The utility logresolve, provided in
the /support directory, can be used to look up host
names from logged IP addresses offline.
This directive enables RFC1413-compliant logging of the remote user name for each connection, where the client machine runs identd or something similar. This information is logged in the access log.
The information should not be trusted in any way except for rudimentary usage tracking.
Note that this can cause serious latency problems accessing your server since every request requires one of these lookups to be performed. When firewalls are involved each lookup might possibly fail and add 30 seconds of latency to each hit. So in general this is not very useful on public servers accessible from the Internet.
The <IfDefine
test>...</IfDefine> section is used to
mark directives that are conditional. The directives within an
The test in the
!parameter-nameIn the former case, the directives between the start and end markers are only processed if the parameter named parameter-name is defined. The second format reverses the test, and only processes the directives if parameter-name is not defined.
The parameter-name argument is a define as given on
the httpd command line via
-Dparameter-, at the time the server was
started.
$ httpd -DReverseProxy ... # httpd.conf <IfDefine ReverseProxy> LoadModule rewrite_module modules/mod_rewrite.so LoadModule proxy_module modules/libproxy.so </IfDefine>
The <IfModule
test>...</IfModule> section is used to
mark directives that are conditional. The directives within an
The test in the
In the former case, the directives between the start and end
markers are only processed if the module named module
name is included in Apache -- either compiled in or
dynamically loaded using
The module name argument is the file name of the
module, at the time it was compiled.
For example, mod_rewrite.c.
This directive allows inclusion of other configuration files from within the server configuration files.
If
The file path specified may be a fully qualified path (i.e.
starting with a slash), or may be relative to the
Examples:
Or, providing paths relative to your ServerRoot
directory:
Make sure that an included directory does not contain any stray
files, such as editor temporary files, for example, as Apache will
attempt to read them in and use the contents as configuration
directives, which may cause the server to fail on start up.
Running apachectl configtest will give you a list of
the files that are being processed during the configuration
check:
root@host# apachectl configtest Processing config directory: /usr/local/apache/conf/vhosts Processing config file: /usr/local/apache/conf/vhosts/vhost1 Processing config file: /usr/local/apache/conf/vhosts/vhost2 Syntax OK
This will help in verifying that you are getting only the files that you intended as part of your configuration.
The Keep-Alive extension to HTTP/1.0 and the persistent
connection feature of HTTP/1.1 provide long-lived HTTP sessions
which allow multiple requests to be sent over the same TCP
connection. In some cases this has been shown to result in an
almost 50% speedup in latency times for HTML documents with
many images. To enable Keep-Alive connections in Apache 1.2 and
later, set KeepAlive On.
For HTTP/1.0 clients, Keep-Alive connections will only be used if they are specifically requested by a client. In addition, a Keep-Alive connection with an HTTP/1.0 client can only be used when the length of the content is known in advance. This implies that dynamic content such as CGI output, SSI pages, and server-generated directory listings will generally not use Keep-Alive connections to HTTP/1.0 clients. For HTTP/1.1 clients, persistent connections are the default unless otherwise specified. If the client requests it, chunked encoding will be used in order to send content of unknown length over persistent connections.
The number of seconds Apache will wait for a subsequent
request before closing the connection. Once a request has been
received, the timeout value specified by the
Setting
Access controls are normally effective for
all access methods, and this is the usual
desired behavior. In the general case, access control
directives should not be placed within a
The purpose of the <Limit>
bracket will have no effect. The following
example applies the access control only to the methods POST, PUT,
and DELETE, leaving all other methods unprotected:
<Limit POST PUT DELETE>
Require valid-user
</Limit>
The method names listed can be one or more of: GET, POST, PUT, DELETE, CONNECT, OPTIONS, TRACE, PATCH, PROPFIND, PROPPATCH, MKCOL, COPY, MOVE, LOCK, and UNLOCK. The method name is case-sensitive. If GET is used it will also restrict HEAD requests.
</LimitExcept> are used to enclose
a group of access control directives which will then apply to any
HTTP access method not listed in the arguments;
i.e., it is the opposite of a
For example:
This directive specifies the number of bytes from 0
(meaning unlimited) to 2147483647 (2GB) that are allowed in a
request body. The default value is defined by the compile-time
constant DEFAULT_LIMIT_REQUEST_BODY (0 as
distributed).
The
This directive gives the server administrator greater control over abnormal client request behavior, which may be useful for avoiding some forms of denial-of-service attacks.
If, for example, you are permitting file upload to a particular location, and wich to limit the size of the uploaded file to 100K, you might use the following directive:
Number is an integer from 0 (meaning unlimited) to
32767. The default value is defined by the compile-time
constant DEFAULT_LIMIT_REQUEST_FIELDS (100 as
distributed).
The
This directive gives the server administrator greater control over abnormal client request behavior, which may be useful for avoiding some forms of denial-of-service attacks. The value should be increased if normal clients see an error response from the server that indicates too many fields were sent in the request.
For example:
This directive specifies the number of bytes from 0
to the value of the compile-time constant
DEFAULT_LIMIT_REQUEST_FIELDSIZE (8190 as
distributed) that will be allowed in an HTTP request
header.
The
This directive gives the server administrator greater control over abnormal client request behavior, which may be useful for avoiding some forms of denial-of-service attacks.
For example:
This directive sets the number of bytes from 0 to
the value of the compile-time constant
DEFAULT_LIMIT_REQUEST_LINE (8190 as distributed)
that will be allowed on the HTTP request-line.
The
This directive gives the server administrator greater control over abnormal client request behavior, which may be useful for avoiding some forms of denial-of-service attacks.
For example:
Limit (in bytes) on maximum size of an XML-based request
body. A value of 0 will disable any checking.
Example:
The </Location> directive. .htaccess files are read, and after the
Note that URLs do not have to line up with the filesystem at all, it should be emphasized that <Location> operates completely outside the filesystem.
For all origin (non-proxy) requests, the URL to be matched
is of the form /path/, and you should not include
any http://servername prefix. For proxy requests,
the URL to be matched is of the form
scheme://servername/path, and you must include the
prefix.
The URL may use wildcards In a wild-card string, `?' matches any single character, and `*' matches any sequences of characters.
Extended regular
expressions can also be used, with the addition of the
~ character. For example:
would match URLs that contained the substring "/extra/data" or
"/special/data". In Apache 1.3 and above, a new directive
The
The slash character has
special meaning depending on where in a URL it appears. People may be
used to its behavior in the filesystem where multiple adjacent slashes
are frequently collapsed to a single slash (i.e.,
/home///foo is the same as /home/foo). In
URL-space this is not necessarily true. The <LocationMatch ^/abc> would match the
request URL /abc but not the request URL
//abc. The (non-regex) <Location /abc/def> and the
request is to /abc//def then it will match.
The
would match URLs that contained the substring "/extra/data" or "/special/data".
| Level | Description | Example |
|---|---|---|
emerg |
Emergencies - system is unusable. | "Child cannot open lock file. Exiting" |
alert |
Action must be taken immediately. | "getpwuid: couldn't determine user name from uid" |
crit |
Critical Conditions. | "socket: Failed to get a socket, exiting child" |
error |
Error conditions. | "Premature end of script headers" |
warn |
Warning conditions. | "child process 1234 did not exit, sending another SIGHUP" |
notice |
Normal but significant condition. | "httpd: caught SIGBUS, attempting to dump core in ..." |
info |
Informational. | "Server seems busy, (you may need to increase StartServers, or Min/MaxSpareServers)..." |
debug |
Debug-level messages | "Opening config file ..." |
When a particular level is specified, messages from all
other levels of higher significance will be reported as well.
E.g., when LogLevel info is specified,
then messages with log levels of notice and
warn will also be posted.
Using a level of at least crit is
recommended.
For example:
The 0", unlimited requests will be allowed. We
recommend that this setting be kept to a high value for maximum
server performance.
For example:
The
Although addr can be hostname it is recommended that you always use an IP address, e.g.
With the
Note: the "main server" and any _default_ servers will
never be served for a request to a
Optionally you can specify a port number on which the name-based virtual hosts should be used, e.g.
IPv6 addresses must be enclosed in square brackets, as shown in the following example:
The
option can be set to None, in which
case none of the extra features are enabled, or one or more of
the following:
Normally, if multiple
For example, without any + and - symbols:
then only Includes will be set for the
/web/docs/spec directory. However if the second
then the options FollowSymLinks and
Includes are set for the /web/docs/spec directory.
Note: Using -IncludesNOEXEC or
-Includes disables server-side includes completely
regardless of the previous setting.
The default in the absence of any other settings is
All.
This directive selects which authenticated users can access a directory. The allowed syntaxes are:
Only the named users can access the directory.
Only users in the named groups can access the directory.
All valid users can access the directory.
Access controls which are applied in this way are effective for
all methods. This is what is normally
desired. If you wish to apply access controls only to
specific methods, while leaving other methods unprotected, then
place the
Takes 1 or 2 parameters. The first parameter sets the soft resource limit for all processes and the second parameter sets the maximum resource limit. Either parameter can be a number, or max to indicate to the server that the limit should be set to the maximum allowed by the operating system configuration. Raising the maximum resource limit requires that the server is running as root, or in the initial startup phase.
This applies to processes forked off from Apache children servicing requests, not the Apache children themselves. This includes CGI scripts and SSI exec commands, but not any processes forked off from the Apache parent such as piped logs.
CPU resource limits are expressed in seconds per process.
Takes 1 or 2 parameters. The first parameter sets the soft resource limit for all processes and the second parameter sets the maximum resource limit. Either parameter can be a number, or max to indicate to the server that the limit should be set to the maximum allowed by the operating system configuration. Raising the maximum resource limit requires that the server is running as root, or in the initial startup phase.
This applies to processes forked off from Apache children servicing requests, not the Apache children themselves. This includes CGI scripts and SSI exec commands, but not any processes forked off from the Apache parent such as piped logs.
Memory resource limits are expressed in bytes per process.
Takes 1 or 2 parameters. The first parameter sets the soft
resource limit for all processes and the second parameter sets
the maximum resource limit. Either parameter can be a number,
or max to indicate to the server that the limit
should be set to the maximum allowed by the operating system
configuration. Raising the maximum resource limit requires that
the server is running as root, or in the initial startup
phase.
This applies to processes forked off from Apache children servicing requests, not the Apache children themselves. This includes CGI scripts and SSI exec commands, but not any processes forked off from the Apache parent such as piped logs.
Process limits control the number of processes per user.
Note: If CGI processes are not running under userids other than the web server userid, this directive will limit the number of processes that the server itself can create. Evidence of this situation will be indicated by cannot fork messages in the error_log.
Access policy if both
For example, if you wanted to let people on your network have unrestricted access to a portion of your website, but require that people outside of your network provide a password, you could use a configuration similar to the following:
This directive is used to control how Apache finds the
interpreter used to run CGI scripts. The default technique is to
use the interpreter pointed to by the #! line in the
script. Setting ScriptInterpreterSource registry will
cause the Windows Registry to be searched using the script file
extension (e.g., .pl) as a search key.
The
It may be worth setting up a dedicated address for this, e.g.
as users do not always mention that they are talking about the server!
The
The simple.example.com,
but the machine also has the DNS alias www.example.com
and you wish the webserver to be so identified, the following
directive should be used:
If no
If you are using name-based virtual hosts,
the Host: header to match this virtual host.
See the description of the
The
The conf/ and logs/. Relative
paths for other configuration files are taken as relative to this
directory.
-d
option to httpdThe
The Off
setting, which is the default, suppresses the error line (and is
therefore compatible with the behavior of Apache-1.2 and
below). The On setting simply adds a line with the
server version number and EMail setting additionally creates a
"mailto:" reference to the
This directive controls whether Server response
header field which is sent back to clients includes a
description of the generic OS-type of the server as well as
information about compiled-in modules.
ServerTokens Prod[uctOnly]Server:
ApacheServerTokens Min[imal]Server:
Apache/1.3.0ServerTokens OSServer: Apache/1.3.0
(Unix)ServerTokens Full (or not specified)Server: Apache/1.3.0
(Unix) PHP/3.0 MyMod/1.2This setting applies to the entire server, and cannot be enabled or disabled on a virtualhost-by-virtualhost basis.
When placed into an .htaccess file or a
.htaccess file in that directory:
Another example: if you wanted to have the server display a
status report whenever a URL of
http://servername/status was called, you might put
the following into httpd.conf:
The
If more than one filter is specified, they must be separated by semicolons in the order in which they should process the content.
The
For example, the following configuration will process all files
in the /www/data/ directory for server-side
includes.
If more than one filter is specified, they must be separated by semicolons in the order in which they should process the content.
The
We plan on making these separately configurable at some point down the road. The timer used to default to 1200 before 1.2, but has been lowered to 300 which is still far more than necessary in most situations. It is not set any lower by default because there may still be odd places in the code where the timer is not reset when a packet is sent.
In many situations Apache has to construct a
self-referential URL. That is, a URL which refers back to
the same server. With UseCanonicalName on Apache will
use the hostname and port specified in the SERVER_NAME and
SERVER_PORT in CGIs.
With UseCanonicalName off Apache will form
self-referential URLs using the hostname and port supplied by
the client if any are supplied (otherwise it will use the
canonical name). These values are the same that are used to
implement name based
virtual hosts, and are available with the same clients. The
CGI variables SERVER_NAME and
SERVER_PORT will be constructed from the client
supplied values as well.
An example where this may be useful is on an intranet server
where you have users connecting to the machine using short
names such as www. You'll notice that if the users
type a shortname, and a URL which is a directory, such as
http://www/splat, without the trailing
slash then Apache will redirect them to
http://www.domain.com/splat/. If you have
authentication enabled, this will cause the user to have to
reauthenticate twice (once for www and once again
for www.domain.com). But if
http://www/splat/.
There is a third option, UseCanonicalName DNS,
which is intended for use with mass IP-based virtual hosting to
support ancient clients that do not provide a
Host: header. With this option Apache does a
reverse DNS lookup on the server IP address that the client
connected to in order to work out self-referential URLs.
Warning: if CGIs make assumptions about the
values of SERVER_NAME they may be broken by this
option. The client is essentially free to give whatever value
they want as a hostname. But if the CGI is only using
SERVER_NAME to construct self-referential URLs
then it should be just fine.
</VirtualHost> are used to enclose a group of
directives which will apply only to a particular virtual host. Any
directive which is allowed in a virtual host context may be
used. When the server receives a request for a document on a
particular virtual host, it uses the configuration directives
enclosed in the
IPv6 addresses must be specified in square brackets because the optional port number could not be determined otherwise. An IPv6 example is shown below:
Each Virtual Host must correspond to a different IP address,
different port number or a different host name for the server,
in the former case the server machine must be configured to
accept IP packets for multiple addresses. (If the machine does
not have multiple network interfaces, then this can be
accomplished with the ifconfig alias command (if
your OS supports it), or with kernel patches like VIF (for SunOS(TM) 4.1.x)).
The special name _default_ can be specified in
which case this virtual host will match any IP address that is
not explicitly listed in another virtual host. In the absence
of any _default_ virtual host the "main" server config,
consisting of all those definitions outside any VirtualHost
section, is used when no match occurs.
You can specify a :port to change the port that is
matched. If unspecified then it defaults to the same port as the
most recent :*
to match all ports on that address. (This is recommended when used
with _default_.)
SECURITY: See the security tips document for details on why your security could be compromised if the directory where logfiles are stored is writable by anyone other than the user that starts the server.
NOTE: The use of