rbowen 00/09/11 19:29:17
Modified: htdocs/manual location.html readme-tpf.html htdocs/manual/misc FAQ-G.html FAQ.html perf-tuning.html security_tips.html htdocs/manual/mod core.html directives.html mod_access.html mod_auth.html mod_auth_anon.html mod_auth_db.html mod_auth_dbm.html mod_auth_digest.html mod_proxy.html mod_status.html htdocs/manual/vhosts examples.html host.html Log: Replaced 'allow' with 'Allow', 'order' with 'Order', 'require' with 'Require', 'deny' with 'Deny'. I think I got it everywhere. Now all directives are capitalized, rather than having a few that are inexplicably lower-case for "historical reasons." Consistency is a Good Thing. Submitted by: Rich Bowen <[EMAIL PROTECTED]> Revision Changes Path 1.13 +3 -3 httpd-docs-1.3/htdocs/manual/location.html Index: location.html =================================================================== RCS file: /home/cvs/httpd-docs-1.3/htdocs/manual/location.html,v retrieving revision 1.12 retrieving revision 1.13 diff -u -r1.12 -r1.13 --- location.html 1998/05/20 14:22:32 1.12 +++ location.html 2000/09/12 02:29:08 1.13 @@ -56,9 +56,9 @@ <PRE> <Location /status> SetHandler server-status - order deny,allow - deny from all - allow from .foo.com + Order Deny,Allow + Deny from all + Allow from .foo.com </Location> </PRE> 1.8 +1 -1 httpd-docs-1.3/htdocs/manual/readme-tpf.html Index: readme-tpf.html =================================================================== RCS file: /home/cvs/httpd-docs-1.3/htdocs/manual/readme-tpf.html,v retrieving revision 1.7 retrieving revision 1.8 diff -u -r1.7 -r1.8 --- readme-tpf.html 1999/12/21 20:43:49 1.7 +++ readme-tpf.html 2000/09/12 02:29:09 1.8 @@ -129,7 +129,7 @@ </UL></MULTICOL> <A NAME="notes"></A><b>Notes:</b> <ol> - <li>Use of mod_access directives "<tt>allow from</tt>" & "<tt>deny from</tt>" + <li>Use of mod_access directives "<tt>Allow from</tt>" & "<tt>Deny from</tt>" with host <i>names</i> (verses ip addresses) requires TPF version 4.1 PUT10 <li>CGI execution requires TPF version 4.1 PUT10 </ol> 1.4 +5 -5 httpd-docs-1.3/htdocs/manual/misc/FAQ-G.html Index: FAQ-G.html =================================================================== RCS file: /home/cvs/httpd-docs-1.3/htdocs/manual/misc/FAQ-G.html,v retrieving revision 1.3 retrieving revision 1.4 diff -u -r1.3 -r1.4 --- FAQ-G.html 2000/04/18 19:43:59 1.3 +++ FAQ-G.html 2000/09/12 02:29:10 1.4 @@ -31,7 +31,7 @@ <!--#include virtual="header.html" --> <H1 ALIGN="CENTER">Apache Server Frequently Asked Questions</H1> <P> - $Revision: 1.3 $ ($Date: 2000/04/18 19:43:59 $) + $Revision: 1.4 $ ($Date: 2000/09/12 02:29:10 $) </P> <P> The latest version of this FAQ is always available from the main @@ -192,9 +192,9 @@ </P> <P> <DL> - <DD><CODE>deny from all + <DD><CODE>Deny from all <BR> - allow from .domain.com + Allow from .domain.com <BR> AuthType Basic <BR> @@ -202,9 +202,9 @@ <BR> AuthName "special directory" <BR> - require valid-user + Require valid-user <BR> - satisfy any</CODE> + Satisfy any</CODE> </DD> </DL> <P></P> 1.146 +2 -2 httpd-docs-1.3/htdocs/manual/misc/FAQ.html Index: FAQ.html =================================================================== RCS file: /home/cvs/httpd-docs-1.3/htdocs/manual/misc/FAQ.html,v retrieving revision 1.145 retrieving revision 1.146 diff -u -r1.145 -r1.146 --- FAQ.html 1999/06/24 15:02:53 1.145 +++ FAQ.html 2000/09/12 02:29:10 1.146 @@ -15,7 +15,7 @@ <!--#include virtual="header.html" --> <H1 ALIGN="CENTER">Apache Server Frequently Asked Questions</H1> <P> - $Revision: 1.145 $ ($Date: 1999/06/24 15:02:53 $) + $Revision: 1.146 $ ($Date: 2000/09/12 02:29:10 $) </P> <P> The latest version of this FAQ is always available from the main @@ -77,7 +77,7 @@ <!-- file) don't have the type listed at all. --> <!-- - RewriteRule /~fraggle/* /cgi-bin/fraggle.pl does not work --> <!-- - how do I disable authentication for a subdirectory? --> -<!-- (A: you can't but "satisfy any; allow from all" can be close --> +<!-- (A: you can't but "Satisfy any; Allow from all" can be close --> <!-- - '400 malformed request' on Win32 might mean stale proxy; see --> <!-- PR #2300. --> <!-- - how do I tell what version of Apache I am running? --> 1.21 +2 -2 httpd-docs-1.3/htdocs/manual/misc/perf-tuning.html Index: perf-tuning.html =================================================================== RCS file: /home/cvs/httpd-docs-1.3/htdocs/manual/misc/perf-tuning.html,v retrieving revision 1.20 retrieving revision 1.21 diff -u -r1.20 -r1.21 --- perf-tuning.html 2000/09/09 17:59:42 1.20 +++ perf-tuning.html 2000/09/12 02:29:10 1.21 @@ -71,8 +71,8 @@ This adds latency to every request because it requires a DNS lookup to complete before the request is finished. In Apache 1.3 this setting defaults to Off. -However (1.3 or later), if you use any <CODE>allow from domain</CODE> or -<CODE>deny from domain</CODE> directives then you will pay for a +However (1.3 or later), if you use any <CODE>Allow from domain</CODE> or +<CODE>Deny from domain</CODE> directives then you will pay for a double reverse DNS lookup (a reverse, followed by a forward to make sure that the reverse is not being spoofed). So for the highest performance avoid using these directives (it's fine to use IP addresses rather than 1.22 +4 -4 httpd-docs-1.3/htdocs/manual/misc/security_tips.html Index: security_tips.html =================================================================== RCS file: /home/cvs/httpd-docs-1.3/htdocs/manual/misc/security_tips.html,v retrieving revision 1.21 retrieving revision 1.22 diff -u -r1.21 -r1.22 --- security_tips.html 1999/11/14 22:22:38 1.21 +++ security_tips.html 2000/09/12 02:29:11 1.22 @@ -131,7 +131,7 @@ <Directory /> <BR> AllowOverride None <BR> Options None <BR> -allow from all <BR> +Allow from all <BR> </Directory> <BR> </CODE></BLOCKQUOTE> @@ -164,7 +164,7 @@ </P> <PRE> <Directory /> - Order deny,allow + Order Deny,Allow Deny from all </Directory> </PRE> @@ -179,11 +179,11 @@ </P> <PRE> <Directory /usr/users/*/public_html> - Order deny,allow + Order Deny,Allow Allow from all </Directory> <Directory /usr/local/httpd> - Order deny,allow + Order Deny,Allow Allow from all </Directory> </PRE> 1.170 +20 -19 httpd-docs-1.3/htdocs/manual/mod/core.html Index: core.html =================================================================== RCS file: /home/cvs/httpd-docs-1.3/htdocs/manual/mod/core.html,v retrieving revision 1.169 retrieving revision 1.170 diff -u -r1.169 -r1.170 --- core.html 2000/09/09 19:47:33 1.169 +++ core.html 2000/09/12 02:29:12 1.170 @@ -70,7 +70,7 @@ <LI><A HREF="#options">Options</A> <LI><A HREF="#pidfile">PidFile</A> <LI><A HREF="#port">Port</A> -<LI><A HREF="#require">require</A> +<LI><A HREF="#require">Require</A> <LI><A HREF="#resourceconfig">ResourceConfig</A> <LI><A HREF="#rlimitcpu">RLimitCPU</A> <LI><A HREF="#rlimitmem">RLimitMEM</A> @@ -251,7 +251,7 @@ <A HREF="mod_auth.html#authgroupfile">AuthGroupFile</A>, <A HREF="#authname">AuthName</A>, <A HREF="#authtype">AuthType</A>, <A HREF="mod_auth.html#authuserfile">AuthUserFile</A>, -<A HREF="#require">require</A>, <EM>etc.</EM>). +<A HREF="#require">Require</A>, <EM>etc.</EM>). <DT>FileInfo <DD> <!--%plaintext <?INDEX {\tt FileInfo} override> --> @@ -280,7 +280,7 @@ <DT>Limit <DD> <!--%plaintext <?INDEX {\tt Limit} override> --> -Allow use of the directives controlling host access (allow, deny and order). +Allow use of the directives controlling host access (Allow, Deny and Order). <DT>Options <DD> <!--%plaintext <?INDEX {\tt Options} override> --> @@ -313,7 +313,7 @@ password to send. <SAMP>AuthName</SAMP> takes a single argument; if the realm name contains spaces, it must be enclosed in quotation marks. It must be accompanied by <A HREF="#authtype">AuthType</A> and -<A HREF="#require">require</A> directives, and directives such as +<A HREF="#require">Require</A> directives, and directives such as <A HREF="mod_auth.html#authuserfile">AuthUserFile</A> and <A HREF="mod_auth.html#authgroupfile">AuthGroupFile</A> to work.<P><HR> @@ -340,7 +340,7 @@ Only <CODE>Basic</CODE> and <CODE>Digest</CODE> are currently implemented. <!--%plaintext <?INDEX {\tt Basic} authentication scheme> --> It must be accompanied by <A HREF="#authname">AuthName</A> and -<A HREF="#require">require</A> directives, and directives such as +<A HREF="#require">Require</A> directives, and directives such as <A HREF="mod_auth.html#authuserfile">AuthUserFile</A> and <A HREF="mod_auth.html#authgroupfile">AuthGroupFile</A> to work.<P><HR> @@ -1362,7 +1362,7 @@ <BLOCKQUOTE><CODE> <Limit POST PUT DELETE><BR> -require valid-user<BR> +Require valid-user<BR> </Limit></CODE></BLOCKQUOTE> The method names listed can be one or more of: GET, POST, PUT, DELETE, @@ -1764,9 +1764,9 @@ <PRE> <Location /status> SetHandler server-status - order deny,allow - deny from all - allow from .foo.com + Order Deny,Allow + Deny from all + Allow from .foo.com </Location> </PRE> @@ -2372,12 +2372,12 @@ root whilst handling connections, your site may be open to a major security attack.<P><HR> -<H2><A NAME="require">require directive</A></H2> -<!--%plaintext <?INDEX {\tt require} directive> --> +<H2><A NAME="require">Require directive</A></H2> +<!--%plaintext <?INDEX {\tt Require} directive> --> <A HREF="directive-dict.html#Syntax" REL="Help" -><STRONG>Syntax:</STRONG></A> require <EM>entity-name entity entity...</EM><BR> +><STRONG>Syntax:</STRONG></A> Require <EM>entity-name entity entity...</EM><BR> <A HREF="directive-dict.html#Context" REL="Help" @@ -2394,11 +2394,11 @@ This directive selects which authenticated users can access a directory. The allowed syntaxes are: <UL> -<LI>require user <EM>userid userid ...</EM><P> +<LI>Require user <EM>userid userid ...</EM><P> Only the named users can access the directory.<P> -<LI>require group <EM>group-name group-name ...</EM><P> +<LI>Require group <EM>group-name group-name ...</EM><P> Only users in the named groups can access the directory.<P> -<LI>require valid-user<P> +<LI>Require valid-user<P> All valid users can access the directory. </UL> <P> @@ -2412,14 +2412,14 @@ AuthName "Restricted Directory"<BR> AuthUserFile /web/users<BR> AuthGroupFile /web/groups<BR> -require group admin<BR> +Require group admin<BR> </CODE></BLOCKQUOTE> Access controls which are applied in this way are effective for <STRONG>all</STRONG> methods. <STRONG>This is what is normally desired.</STRONG> If you wish to apply access controls only to specific methods, while leaving other methods unprotected, then place -the <CODE>require</CODE> statement into a <A +the <CODE>Require</CODE> statement into a <A HREF="#limit"><Limit></A> section<P> <P>See also <A HREF="#satisfy">Satisfy</A> and <A HREF="mod_access.html">mod_access</A>. <HR> @@ -2619,7 +2619,8 @@ ><STRONG>Compatibility:</STRONG></A> Satisfy is only available in Apache 1.2 and later<P> -Access policy if both allow and require used. The parameter can be +Access policy if both <CODE>Allow</CODE> and <CODE>Require</CODE> +used. The parameter can be either <EM>'all'</EM> or <EM>'any'</EM>. This directive is only useful if access to a particular area is being restricted by both username/password <EM>and</EM> client host address. In this case the @@ -2630,7 +2631,7 @@ password. This can be used to password restrict an area, but to let clients from particular addresses in without prompting for a password. <P> -See also <A HREF="#require">require</A> and +See also <A HREF="#require">Require</A> and <A HREF="mod_access.html">mod_access</A>. <P><HR> 1.67 +4 -4 httpd-docs-1.3/htdocs/manual/mod/directives.html Index: directives.html =================================================================== RCS file: /home/cvs/httpd-docs-1.3/htdocs/manual/mod/directives.html,v retrieving revision 1.66 retrieving revision 1.67 diff -u -r1.66 -r1.67 --- directives.html 2000/07/14 17:34:33 1.66 +++ directives.html 2000/09/12 02:29:13 1.67 @@ -45,7 +45,7 @@ <LI><A HREF="mod_log_agent.html#agentlog">AgentLog</A> <LI><A HREF="mod_alias.html#alias">Alias</A> <LI><A HREF="mod_alias.html#aliasmatch">AliasMatch</A> -<LI><A HREF="mod_access.html#allow">allow</A> +<LI><A HREF="mod_access.html#allow">Allow</A> <LI><A HREF="mod_proxy.html#allowconnect">AllowCONNECT</A> <LI><A HREF="core.html#allowoverride">AllowOverride</A> <LI><A HREF="mod_auth_anon.html#anonymous">Anonymous</A> @@ -93,7 +93,7 @@ <LI><A HREF="mod_autoindex.html#defaulticon">DefaultIcon</A> <LI><A HREF="mod_mime.html#defaultlanguage">DefaultLanguage</A> <LI><A HREF="core.html#defaulttype">DefaultType</A> -<LI><A HREF="mod_access.html#deny">deny</A> +<LI><A HREF="mod_access.html#deny">Deny</A> <LI><A HREF="core.html#directory"><Directory></A> <LI><A HREF="core.html#directorymatch"><DirectoryMatch></A> <LI><A HREF="mod_dir.html#directoryindex">DirectoryIndex</A> @@ -154,7 +154,7 @@ <LI><A HREF="core.html#namevirtualhost">NameVirtualHost</A> <LI><A HREF="mod_proxy.html#nocache">NoCache</A> <LI><A HREF="core.html#options">Options</A> -<LI><A HREF="mod_access.html#order">order</A> +<LI><A HREF="mod_access.html#order">Order</A> <LI><A HREF="mod_env.html#passenv">PassEnv</A> <LI><A HREF="core.html#pidfile">PidFile</A> <LI><A HREF="core.html#port">Port</A> @@ -176,7 +176,7 @@ <LI><A HREF="mod_mime.html#removeencoding">RemoveEncoding</A> <LI><A HREF="mod_mime.html#removehandler">RemoveHandler</A> <LI><A HREF="mod_mime.html#removetype">RemoveType</A> -<LI><A HREF="core.html#require">require</A> +<LI><A HREF="core.html#require">Require</A> <LI><A HREF="core.html#resourceconfig">ResourceConfig</A> <LI><A HREF="mod_rewrite.html#RewriteBase">RewriteBase</A> <LI><A HREF="mod_rewrite.html#RewriteCond">RewriteCond</A> 1.21 +53 -51 httpd-docs-1.3/htdocs/manual/mod/mod_access.html Index: mod_access.html =================================================================== RCS file: /home/cvs/httpd-docs-1.3/htdocs/manual/mod/mod_access.html,v retrieving revision 1.20 retrieving revision 1.21 diff -u -r1.20 -r1.21 --- mod_access.html 1999/12/19 18:46:59 1.20 +++ mod_access.html 2000/09/12 02:29:13 1.21 @@ -22,26 +22,26 @@ </P> <UL> -<LI><A HREF="#allow">allow</A> -<LI><A HREF="#allowfromenv">allow from env=</A> -<LI><A HREF="#deny">deny</A> -<LI><A HREF="#denyfromenv">deny from env=</A> -<LI><A HREF="#order">order</A> +<LI><A HREF="#allow">Allow</A> +<LI><A HREF="#allowfromenv">Allow from env=</A> +<LI><A HREF="#deny">Deny</A> +<LI><A HREF="#denyfromenv">Deny from env=</A> +<LI><A HREF="#order">Order</A> </UL> <DL> <DD>See also <A HREF="core.html#satisfy">Satisfy</A> - and <A HREF="core.html#require">require</A>. + and <A HREF="core.html#require">Require</A>. </DL> <HR> -<H2><A NAME="allow">allow directive</A></H2> +<H2><A NAME="allow">Allow directive</A></H2> <P> -<!--%plaintext <?INDEX {\tt allow} directive> --> +<!--%plaintext <?INDEX {\tt Allow} directive> --> <A HREF="directive-dict.html#Syntax" REL="Help" -><STRONG>Syntax:</STRONG></A> allow from <EM>host host ...</EM><BR> +><STRONG>Syntax:</STRONG></A> Allow from <EM>host host ...</EM><BR> <A HREF="directive-dict.html#Context" REL="Help" @@ -60,7 +60,7 @@ ><STRONG>Module:</STRONG></A> mod_access </P> <P> -The allow directive affects which hosts can access a given directory. +The Allow directive affects which hosts can access a given directory. <EM>Host</EM> is one of the following: </P> <DL> @@ -82,7 +82,7 @@ <P> Example: </P> -<BLOCKQUOTE><CODE>allow from .ncsa.uiuc.edu</CODE></BLOCKQUOTE> +<BLOCKQUOTE><CODE>Allow from .ncsa.uiuc.edu</CODE></BLOCKQUOTE> <P> All hosts in the specified domain are allowed access. </P> @@ -91,12 +91,12 @@ would not match <CODE>foobar.edu</CODE>. </P> <P> -See also <A HREF="#deny">deny</A>, <A HREF="#order">order</A>, and +See also <A HREF="#deny">Deny</A>, <A HREF="#order">Order</A>, and <A HREF="mod_browser.html#browsermatch">BrowserMatch</A>. </P> <P> -<A NAME="allowfromenv"><STRONG>Syntax:</STRONG> allow from +<A NAME="allowfromenv"><STRONG>Syntax:</STRONG> Allow from env=<EM>variablename</EM></A><BR> <A HREF="directive-dict.html#Context" @@ -120,7 +120,7 @@ ><STRONG>Compatibility:</STRONG></A> Apache 1.2 and above </P> <P> -The allow from env directive controls access to a directory by the +The <CODE>Allow from env</CODE> directive controls access to a directory by the existence (or non-existence) of an environment variable. </P> <P> @@ -129,26 +129,26 @@ <BLOCKQUOTE><PRE> BrowserMatch ^KnockKnock/2.0 let_me_in <Directory /docroot> - order deny,allow - deny from all - allow from env=let_me_in + Order Deny,Allow + Deny from all + Allow from env=let_me_in </Directory> </PRE></BLOCKQUOTE> In this case browsers with the user-agent string <TT>KnockKnock/2.0</TT> will be allowed access, and all others will be denied. <P> -See also <A HREF="#denyfromenv">deny from env</A> -and <A HREF="#order">order</A>. +See also <A HREF="#denyfromenv">Deny from env</A> +and <A HREF="#order">Order</A>. </P> <HR> -<H2><A NAME="deny">deny directive</A></H2> +<H2><A NAME="deny">Deny directive</A></H2> <P> -<!--%plaintext <?INDEX {\tt deny} directive> --> +<!--%plaintext <?INDEX {\tt Deny} directive> --> <A HREF="directive-dict.html#Syntax" REL="Help" -><STRONG>Syntax:</STRONG></A> deny from <EM>host host ...</EM><BR> +><STRONG>Syntax:</STRONG></A> Deny from <EM>host host ...</EM><BR> <A HREF="directive-dict.html#Context" REL="Help" @@ -167,7 +167,7 @@ ><STRONG>Module:</STRONG></A> mod_access </P> <P> -The deny directive affects which hosts can access a given directory. +The <CODE>Deny</CODE> directive affects which hosts can access a given directory. <EM>Host</EM> is one of the following: </P> <DL> @@ -189,7 +189,7 @@ <P> Example: </P> -<BLOCKQUOTE><CODE>deny from 16</CODE></BLOCKQUOTE> +<BLOCKQUOTE><CODE>Deny from 16</CODE></BLOCKQUOTE> <P> All hosts in the specified network are denied access. </P> @@ -198,11 +198,11 @@ would not match <CODE>foobar.edu</CODE>. </P> <P> -See also <A HREF="#allow">allow</A> and <A HREF="#order">order</A>. +See also <A HREF="#allow">Allow</A> and <A HREF="#order">Order</A>. </P> <P> -<A NAME="denyfromenv"><STRONG>Syntax:</STRONG> deny from +<A NAME="denyfromenv"><STRONG>Syntax:</STRONG> Deny from env=<EM>variablename</EM></A><BR> <A HREF="directive-dict.html#Context" @@ -226,7 +226,7 @@ ><STRONG>Compatibility:</STRONG></A> Apache 1.2 and above </P> <P> -The deny from env directive controls access to a directory by the +The <CODE>Deny from env</CODE> directive controls access to a directory by the existence (or non-existence) of an environment variable. </P> <P> @@ -235,31 +235,31 @@ <BLOCKQUOTE><PRE> BrowserMatch ^BadRobot/0.9 go_away <Directory /docroot> - order allow,deny - allow from all - deny from env=go_away + Order Allow,Deny + Allow from all + Deny from env=go_away </Directory> </PRE></BLOCKQUOTE> In this case browsers with the user-agent string <TT>BadRobot/0.9</TT> will be denied access, and all others will be allowed. <P> -See also <A HREF="#allowfromenv">allow from env</A> -and <A HREF="#order">order</A>. +See also <A HREF="#allowfromenv">Allow from env</A> +and <A HREF="#order">Order</A>. </P> <HR> -<H2><A NAME="order">order directive</A></H2> +<H2><A NAME="order">Order directive</A></H2> <P> -<!--%plaintext <?INDEX {\tt order} directive> --> +<!--%plaintext <?INDEX {\tt Order} directive> --> <A HREF="directive-dict.html#Syntax" REL="Help" -><STRONG>Syntax:</STRONG></A> order <EM>ordering</EM><BR> +><STRONG>Syntax:</STRONG></A> Order <EM>ordering</EM><BR> <A HREF="directive-dict.html#Default" REL="Help" -><STRONG>Default:</STRONG></A> <CODE>order deny,allow</CODE><BR> +><STRONG>Default:</STRONG></A> <CODE>Order Deny,Allow</CODE><BR> <A HREF="directive-dict.html#Context" REL="Help" @@ -278,34 +278,36 @@ ><STRONG>Module:</STRONG></A> mod_access </P> <P> -The order directive controls the order in which <A HREF="#allow">allow</A> and -<A HREF="#deny">deny</A> directives are evaluated. <EM>Ordering</EM> is one +The <CODE>Order</CODE> directive controls the order in which +<A HREF="#allow">Allow</A> and <A HREF="#deny">Deny</A> directives are +evaluated. <EM>Ordering</EM> is one of </P> <DL> -<DT>deny,allow -<DD>the deny directives are evaluated before the allow directives. (The -initial state is OK.) -<DT>allow,deny -<DD>the allow directives are evaluated before the deny directives. (The -initial state is FORBIDDEN.) -<DT>mutual-failure -<DD>Only those hosts which appear on the allow list and do not appear -on the deny list are granted access. (The initial state is irrelevant.) +<DT>Deny,Allow +<DD>the <CODE>Deny</CODE> directives are evaluated before the <CODE>Allow</CODE> +directives. (The initial state is OK.) +<DT>Allow,Deny +<DD>the <CODE>Allow</CODE> directives are evaluated before the <CODE>Deny</CODE> +directives. (The initial state is FORBIDDEN.) +<DT>Mutual-failure +<DD>Only those hosts which appear on the <CODE>Allow</CODE> list and do not +appear on the <CODE>Deny</CODE> list are granted access. (The initial state is +irrelevant.) </DL> <P> Keywords may only be separated by a comma; no whitespace is allowed between them. -<STRONG>Note that in all cases every <CODE>allow</CODE> and <CODE>deny</CODE> +<STRONG>Note that in all cases every <CODE>Allow</CODE> and <CODE>Deny</CODE> statement is evaluated, there is no "short-circuiting".</STRONG> </P> <P> Example: </P> <BLOCKQUOTE><CODE> - order deny,allow<BR> - deny from all<BR> - allow from .ncsa.uiuc.edu<BR> + Order Deny,Allow<BR> + Deny from all<BR> + Allow from .ncsa.uiuc.edu<BR> </CODE></BLOCKQUOTE> <P> Hosts in the ncsa.uiuc.edu domain are allowed access; all other hosts are 1.18 +1 -1 httpd-docs-1.3/htdocs/manual/mod/mod_auth.html Index: mod_auth.html =================================================================== RCS file: /home/cvs/httpd-docs-1.3/htdocs/manual/mod/mod_auth.html,v retrieving revision 1.17 retrieving revision 1.18 diff -u -r1.17 -r1.18 --- mod_auth.html 1999/08/04 22:03:04 1.17 +++ mod_auth.html 2000/09/12 02:29:13 1.18 @@ -165,7 +165,7 @@ <P> So if a userID appears in the database of more than one module; or if -a valid require directive applies to more than one module; then the +a valid <CODE>Require</CODE> directive applies to more than one module; then the first module will verify the credentials; and no access is passed on; regardless of the AuthAuthoritative setting. 1.24 +3 -3 httpd-docs-1.3/htdocs/manual/mod/mod_auth_anon.html Index: mod_auth_anon.html =================================================================== RCS file: /home/cvs/httpd-docs-1.3/htdocs/manual/mod/mod_auth_anon.html,v retrieving revision 1.23 retrieving revision 1.24 diff -u -r1.23 -r1.24 --- mod_auth_anon.html 1999/08/25 12:49:22 1.23 +++ mod_auth_anon.html 2000/09/12 02:29:14 1.24 @@ -299,10 +299,10 @@ # Anonymous_Authoritative for public access.<BR> # In the .htaccess for the public directory, add:<BR> <Files *><BR> -order deny,allow <BR> -allow from all <BR> +Order Deny,Allow <BR> +Allow from all <BR> <P> -require valid-user <BR> +Require valid-user <BR> </Files><BR> </CODE></BLOCKQUOTE> 1.18 +1 -1 httpd-docs-1.3/htdocs/manual/mod/mod_auth_db.html Index: mod_auth_db.html =================================================================== RCS file: /home/cvs/httpd-docs-1.3/htdocs/manual/mod/mod_auth_db.html,v retrieving revision 1.17 retrieving revision 1.18 diff -u -r1.17 -r1.18 --- mod_auth_db.html 1998/09/17 12:33:07 1.17 +++ mod_auth_db.html 2000/09/12 02:29:14 1.18 @@ -185,7 +185,7 @@ be applied and a failure will give an Authorization Required reply. <P> So if a userID appears in the database of more than one module; or -if a valid require directive applies to more than one module; then +if a valid <CODE>Require</CODE> directive applies to more than one module; then the first module will verify the credentials; and no access is passed on; regardless of the AuthAuthoritative setting. <P> 1.19 +1 -1 httpd-docs-1.3/htdocs/manual/mod/mod_auth_dbm.html Index: mod_auth_dbm.html =================================================================== RCS file: /home/cvs/httpd-docs-1.3/htdocs/manual/mod/mod_auth_dbm.html,v retrieving revision 1.18 retrieving revision 1.19 diff -u -r1.18 -r1.19 --- mod_auth_dbm.html 1998/09/17 12:06:40 1.18 +++ mod_auth_dbm.html 2000/09/12 02:29:14 1.19 @@ -175,7 +175,7 @@ be applied and a failure will give an Authorization Required reply. <P> So if a userID appears in the database of more than one module; or -if a valid require directive applies to more than one module; then +if a valid <CODE>Require</CODE> directive applies to more than one module; then the first module will verify the credentials; and no access is passed on; regardless of the AuthAuthoritative setting. <P> 1.3 +1 -1 httpd-docs-1.3/htdocs/manual/mod/mod_auth_digest.html Index: mod_auth_digest.html =================================================================== RCS file: /home/cvs/httpd-docs-1.3/htdocs/manual/mod/mod_auth_digest.html,v retrieving revision 1.2 retrieving revision 1.3 diff -u -r1.2 -r1.3 --- mod_auth_digest.html 1999/11/22 20:56:53 1.2 +++ mod_auth_digest.html 2000/09/12 02:29:14 1.3 @@ -396,7 +396,7 @@ AuthName "private area" AuthDigestDomain /private/ http://mirror.my.dom/private2/ AuthDigestFile /web/auth/.digest_pw - require valid-user + Require valid-user </Location> </PRE> 1.51 +3 -3 httpd-docs-1.3/htdocs/manual/mod/mod_proxy.html Index: mod_proxy.html =================================================================== RCS file: /home/cvs/httpd-docs-1.3/htdocs/manual/mod/mod_proxy.html,v retrieving revision 1.50 retrieving revision 1.51 diff -u -r1.50 -r1.51 --- mod_proxy.html 1999/06/29 13:54:29 1.50 +++ mod_proxy.html 2000/09/12 02:29:15 1.51 @@ -1081,9 +1081,9 @@ <PRE> <Directory proxy:*> -order deny,allow -deny from [machines you'd like *not* to allow by IP address or name] -allow from [machines you'd like to allow by IP address or name] +Order Deny,Allow +Deny from [machines you'd like *not* to allow by IP address or name] +Allow from [machines you'd like to allow by IP address or name] </Directory> </PRE><P> 1.17 +3 -3 httpd-docs-1.3/htdocs/manual/mod/mod_status.html Index: mod_status.html =================================================================== RCS file: /home/cvs/httpd-docs-1.3/htdocs/manual/mod/mod_status.html,v retrieving revision 1.16 retrieving revision 1.17 diff -u -r1.16 -r1.17 --- mod_status.html 1998/09/12 20:16:51 1.16 +++ mod_status.html 2000/09/12 02:29:15 1.17 @@ -93,9 +93,9 @@ <Location /server-status> SetHandler server-status - order deny,allow - deny from all - allow from .foo.com + Order Deny,Allow + Deny from all + Allow from .foo.com </Location> </PRE> <P> 1.7 +3 -3 httpd-docs-1.3/htdocs/manual/vhosts/examples.html Index: examples.html =================================================================== RCS file: /home/cvs/httpd-docs-1.3/htdocs/manual/vhosts/examples.html,v retrieving revision 1.6 retrieving revision 1.7 diff -u -r1.6 -r1.7 --- examples.html 2000/09/09 18:54:13 1.6 +++ examples.html 2000/09/12 02:29:17 1.7 @@ -128,9 +128,9 @@ ServerName www-cache.domain.tld ... <Directory proxy:> - order deny,allow - deny from all - allow from 111.22.33 + Order Deny,Allow + Deny from all + Allow from 111.22.33 </Directory> </VirtualHost> </PRE> 1.9 +1 -1 httpd-docs-1.3/htdocs/manual/vhosts/host.html Index: host.html =================================================================== RCS file: /home/cvs/httpd-docs-1.3/htdocs/manual/vhosts/host.html,v retrieving revision 1.8 retrieving revision 1.9 diff -u -r1.8 -r1.9 --- host.html 1998/09/17 14:52:03 1.8 +++ host.html 2000/09/12 02:29:17 1.9 @@ -123,7 +123,7 @@ private.foo.com</CODE> header. It is important to note that this condition exists only if you only implement this policy at the IP layer - all security controls used by Apache (<EM>i.e.</EM>, <A -HREF="../mod/mod_access.html">allow, deny from,</A> <EM>etc.</EM>) are +HREF="../mod/mod_access.html">Allow, Deny from,</A> <EM>etc.</EM>) are consistently respected. <H2>Compatibility with Older Browsers</H2>