📄 raserver.conf.example
字号:
#ErrorDocument 404 /missing.html# to redirect to local URL /missing.html#ErrorDocument 404 /cgi-bin/missing_handler.pl# N.B.: You can redirect to a script or a document using server-side-includes.## 3) external redirects#ErrorDocument 402 http://some.other_server.com/subscription_info.html# N.B.: Many of the environment variables associated with the original# request will *not* be available to such a script.## The following directives modify normal HTTP response behavior.# The first directive disables keepalive for Netscape 2.x and browsers that# spoof it. There are known problems with these browser implementations.# The second directive is for Microsoft Internet Explorer 4.0b2# which has a broken HTTP/1.1 implementation and does not properly# support keepalive when it is used on 301 or 302 (redirect) responses.#BrowserMatch "Mozilla/2" nokeepaliveBrowserMatch "MSIE 4\.0b2;" nokeepalive downgrade-1.0 force-response-1.0## The following directive disables HTTP/1.1 responses to browsers which# are in violation of the HTTP/1.0 spec by not being able to grok a# basic 1.1 response.#BrowserMatch "RealPlayer 4\.0" force-response-1.0BrowserMatch "Java/1\.0" force-response-1.0BrowserMatch "JDK/1\.0" force-response-1.0## Allow server status reports, with the URL of http://servername/server-status# Change the ".your_domain.com" to match your domain to enable.##<Location /server-status># SetHandler server-status# Order deny,allow# Deny from all# Allow from .your_domain.com#</Location>## Allow remote server configuration reports, with the URL of# http://servername/server-info (requires that mod_info.c be loaded).# Change the ".your_domain.com" to match your domain to enable.##<Location /server-info># SetHandler server-info# Order deny,allow# Deny from all# Allow from .your_domain.com#</Location>## There have been reports of people trying to abuse an old bug from pre-1.1# days. This bug involved a CGI script distributed as a part of Apache.# By uncommenting these lines you can redirect these attacks to a logging # script on phf.apache.org. Or, you can record them yourself, using the script# support/phf_abuse_log.cgi.##<Location /cgi-bin/phf*># Deny from all# ErrorDocument 403 http://phf.apache.org/phf_abuse_log.cgi#</Location>## Proxy Server directives. Uncomment the following lines to# enable the proxy server:##<IfModule mod_proxy.c>#ProxyRequests On##<Directory proxy:*># Order deny,allow# Deny from all# Allow from .your_domain.com#</Directory>## Enable/disable the handling of HTTP/1.1 "Via:" headers.# ("Full" adds the server version; "Block" removes all outgoing Via: headers)# Set to one of: Off | On | Full | Block##ProxyVia On## To enable the cache as well, edit and uncomment the following lines:# (no cacheing without CacheRoot)##CacheRoot "/usr/local/apache/proxy"#CacheSize 5#CacheGcInterval 4#CacheMaxExpire 24#CacheLastModifiedFactor 0.1#CacheDefaultExpire 1#NoCache a_domain.com another_domain.edu joes.garage_sale.com#</IfModule># End of proxy directives.### Section 3: Virtual Hosts## VirtualHost: If you want to maintain multiple domains/hostnames on your# machine you can setup VirtualHost containers for them.# Please see the documentation at <URL:http://www.apache.org/docs/vhosts/># for further details before you try to setup virtual hosts.# You may use the command line option '-S' to verify your virtual host# configuration.## If you want to use name-based virtual hosts you need to define at# least one IP address (and port number) for them.#<IfDefine SSL>NameVirtualHost xx.xx.xx.xx:443NameVirtualHost yy.yy.yy.yy:4443</IfDefine>## VirtualHost example:# Almost any Apache directive may go into a VirtualHost container.##<VirtualHost ip.address.of.host.some_domain.com># ServerAdmin webmaster@host.some_domain.com# DocumentRoot /www/docs/host.some_domain.com# ServerName host.some_domain.com# ErrorLog logs/host.some_domain.com-error_log# CustomLog logs/host.some_domain.com-access_log common#</VirtualHost>#<VirtualHost _default_:*>#</VirtualHost>#### SSL Global Context#### All SSL configuration in this context applies both to## the main server and all SSL-enabled virtual hosts.#### Some MIME-types for downloading Certificates and CRLs#<IfDefine SSL>AddType application/x-x509-ca-cert .crtAddType application/x-pkcs7-crl .crl</IfDefine><IfModule mod_ssl.c># Pass Phrase Dialog:# Configure the pass phrase gathering process.# The filtering dialog program (`builtin' is a internal# terminal dialog) has to provide the pass phrase on stdout.SSLPassPhraseDialog builtin# Inter-Process Session Cache:# Configure the SSL Session Cache: First either `none'# or `dbm:/path/to/file' for the mechanism to use and# second the expiring timeout (in seconds).SSLSessionCache dbm:/tmp/ssl_scacheSSLSessionCacheTimeout 300# Semaphore:# Configure the path to the mutual explusion semaphore the# SSL engine uses internally for inter-process synchronization. SSLMutex file:/usr/local/apache/logs/ssl_mutex# Pseudo Random Number Generator (PRNG):# Configure one or more sources to seed the PRNG of the # SSL library. The seed data should be of good random quality.SSLRandomSeed startup builtinSSLRandomSeed connect builtin#SSLRandomSeed startup file:/dev/random 512#SSLRandomSeed startup file:/dev/urandom 512#SSLRandomSeed connect file:/dev/random 512#SSLRandomSeed connect file:/dev/urandom 512# Logging:# The home of the dedicated SSL protocol logfile. Errors are# additionally duplicated in the general error log file. Put# this somewhere where it cannot be used for symlink attacks on# a real server (i.e. somewhere where only root can write).# Log levels are (ascending order: higher ones include lower ones):# none, error, warn, info, trace, debug.SSLLog /usr/local/apache/logs/ssl_engine_logSSLLogLevel info</IfModule><IfDefine SSL>#### SSL Virtual Host Context##<VirtualHost xx.xx.xx.xx:4443>ServerName raserver.yourdomain.orgDocumentRoot /home/httpd/htdocs-raserverScriptAlias /cgi-bin/ "/home/httpd/cgi-raserver/"ServerAdmin webmaster@yourdomain.orgErrorLog logs/raserver-error_logCustomLog logs/raserver-access_log commonSSLEngine on# SSL Cipher Suite:# List the ciphers that the client is permitted to negotiate.# See the mod_ssl documentation for a complete list.#SSLCipherSuite ALL:!ADH:RC4+RSA:+HIGH:+MEDIUM:+LOW:+SSLv2:+EXP:+eNULL# Server Certificate:# Point SSLCertificateFile at a PEM encoded certificate. If# the certificate is encrypted, then you will be prompted for a# pass phrase. Note that a kill -HUP will prompt again. A test# certificate can be generated with `make certificate' under# built time.SSLCertificateFile /usr/local/apache/conf/ssl.crt/raserver.crt# Server Private Key:# If the key is not combined with the certificate, use this# directive to point at the key file.SSLCertificateKeyFile /usr/local/apache/conf/ssl.key/raserver.key# Certificate Authority (CA):# Set the CA certificate verification path where to find CA# certificates for client authentication or alternatively one# huge file containing all of them (file must be PEM encoded)# Note: Inside SSLCACertificatePath you need hash symlinks# to point to the certificate files. Use the provided# Makefile to update the hash symlinks after changes.#SSLCACertificatePath /usr/local/apache/conf/ssl.crtSSLCACertificateFile /usr/local/apache/conf/ssl.crt/cacert.crt# Client Authentication (Type):# Client certificate verification type and depth. Types are# none, optional, require and optional_no_ca. Depth is a# number which specifies how deeply to verify the certificate# issuer chain before deciding the certificate is not valid.SSLVerifyClient requireSSLVerifyDepth 10# Access Control:# With SSLRequire you can do per-directory access control based# on arbitrary complex boolean expressions containing server# variable checks and other lookup directives. The syntax is a# mixture between C and Perl. See the mod_ssl documentation# for more details.#<Location />#SSLRequire ( %{SSL_CIPHER} !~ m/^(EXP|NULL)-/ \# and %{SSL_CLIENT_S_DN_O} eq "Snake Oil, Ltd." \# and %{SSL_CLIENT_S_DN_OU} in {"Staff", "CA", "Dev"} \# and %{TIME_WDAY} >= 1 and %{TIME_WDAY} <= 5 \# and %{TIME_HOUR} >= 8 and %{TIME_HOUR} <= 20 ) \# or %{REMOTE_ADDR} =~ m/^192\.76\.162\.[0-9]+$/#</Location># SSL Engine Options:# Set various options for the SSL engine.# FakeBasicAuth:# Translate the client X.509 into a Basic Authorisation. This means that# the standard Auth/DBMAuth methods can be used for access control. The# user name is the `one line' version of the client's X.509 certificate.# Note that no password is obtained from the user. Every entry in the user# file needs this password: `xxj31ZMTZzkVA'.# ExportCertData:# This exports two additional environment variables: SSL_CLIENT_CERT and# SSL_SERVER_CERT. These contain the PEM-encoded certificates of the# server (always existing) and the client (only existing when client# authentication is used). This can be used to import the certificates# into CGI scripts.# CompatEnvVars:# This exports obsolete environment variables for backward compatibility# to Apache-SSL 1.x, mod_ssl 2.0.x, Sioux 1.0 and Stronghold 2.x. Use this# to provide compatibility to existing CGI scripts.#SSLOptions +FakeBasicAuth +ExportCertData +CompatEnvVarsSSLOptions +StdEnvVars# Per-Server Logging:# The home of a custom SSL log file. Use this when you want a# compact non-error SSL logfile on a virtual host basis.CustomLog /usr/local/apache/logs/raserver-ssl_request_log \ "%t %h %{SSL_PROTOCOL}x %{SSL_CIPHER}x \"%r\" %b"</VirtualHost> <VirtualHost yy.yy.yy.yy:443>ServerName secure.yourdomain.orgDocumentRoot /home/httpd/htdocs-publicScriptAlias "/cgi-bin/" "/home/httpd/cgi-public/"ServerAdmin webmaster@yourdomain.orgErrorLog logs/secure-error_logCustomLog logs/secure-access_log common# SSL Engine Switch:# Enable/Disable SSL for this virtual host.SSLEngine on# SSL Cipher Suite:# List the ciphers that the client is permitted to negotiate.# See the mod_ssl documentation for a complete list.#SSLCipherSuite ALL:!ADH:RC4+RSA:+HIGH:+MEDIUM:+LOW:+SSLv2:+EXP:+eNULL# Server Certificate:# Point SSLCertificateFile at a PEM encoded certificate. If# the certificate is encrypted, then you will be prompted for a# pass phrase. Note that a kill -HUP will prompt again. A test# certificate can be generated with `make certificate' under# built time.SSLCertificateFile /usr/local/apache/conf/ssl.crt/secure.crt# Server Private Key:# If the key is not combined with the certificate, use this# directive to point at the key file.SSLCertificateKeyFile /usr/local/apache/conf/ssl.key/secure.key# Certificate Authority (CA):# Set the CA certificate verification path where to find CA# certificates for client authentication or alternatively one# huge file containing all of them (file must be PEM encoded)# Note: Inside SSLCACertificatePath you need hash symlinks# to point to the certificate files. Use the provided# Makefile to update the hash symlinks after changes.#SSLCACertificatePath /usr/local/apache/conf/ssl.crtSSLCACertificateFile /usr/local/apache/conf/ssl.crt/cacert.crt# Client Authentication (Type):# Client certificate verification type and depth. Types are# none, optional, require and optional_no_ca. Depth is a# number which specifies how deeply to verify the certificate# issuer chain before deciding the certificate is not valid.SSLVerifyClient none#SSLVerifyDepth 10# Access Control:# With SSLRequire you can do per-directory access control based# on arbitrary complex boolean expressions containing server# variable checks and other lookup directives. The syntax is a# mixture between C and Perl. See the mod_ssl documentation# for more details.#<Location />#SSLRequire ( %{SSL_CIPHER} !~ m/^(EXP|NULL)-/ \# and %{SSL_CLIENT_S_DN_O} eq "Snake Oil, Ltd." \# and %{SSL_CLIENT_S_DN_OU} in {"Staff", "CA", "Dev"} \# and %{TIME_WDAY} >= 1 and %{TIME_WDAY} <= 5 \# and %{TIME_HOUR} >= 8 and %{TIME_HOUR} <= 20 ) \# or %{REMOTE_ADDR} =~ m/^192\.76\.162\.[0-9]+$/#</Location># SSL Engine Options:# Set various options for the SSL engine.# FakeBasicAuth:# Translate the client X.509 into a Basic Authorisation. This means that# the standard Auth/DBMAuth methods can be used for access control. The# user name is the `one line' version of the client's X.509 certificate.# Note that no password is obtained from the user. Every entry in the user# file needs this password: `xxj31ZMTZzkVA'.# ExportCertData:# This exports two additional environment variables: SSL_CLIENT_CERT and# SSL_SERVER_CERT. These contain the PEM-encoded certificates of the# server (always existing) and the client (only existing when client# authentication is used). This can be used to import the certificates# into CGI scripts.# CompatEnvVars:# This exports obsolete environment variables for backward compatibility# to Apache-SSL 1.x, mod_ssl 2.0.x, Sioux 1.0 and Stronghold 2.x. Use this# to provide compatibility to existing CGI scripts.#SSLOptions +FakeBasicAuth +ExportCertData +CompatEnvVarsSSLOptions +StdEnvVars# Per-Server Logging:# The home of a custom SSL log file. Use this when you want a# compact non-error SSL logfile on a virtual host basis.CustomLog /usr/local/apache/logs/secure-ssl_request_log \ "%t %h %{SSL_PROTOCOL}x %{SSL_CIPHER}x \"%r\" %b"</VirtualHost> </IfDefine>
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -