Doing httpd -M | grep expire:
expires_module (shared)
Syntax OK
and I have found this line in conf file:
LoadModule expires module modules/mod_expires.so
but "ExpireDefault" didn't work
doing httpd -l returns:
core.c
prefork.c
http_core.c
mod_so.c
How to enable the mod_expires module?
I have found a good tutorial for my goal:
http://support.tigertech.net/prevent-caching
How to configure Apache to want to forbid browsers from caching all web pages
in www1.example.com/public
and in www1.example.com/books so every time I ask the browser about any page it
brings it from source.
but I want it to cache the pages under: www1.example.com?
I have found something like that, iS it true to use it:
Your .htaccess file:
# ALLOW USER BY IP
order deny,allow
deny from all
SetEnvIF X-Forwarded-For "1.2.3.4" AllowIP
SetEnvIF X-Forwarded-For "5.6.7.8" AllowIP
Allow from env=AllowIP
allow from 1.2.3.4
allow from 5.6.7.8source:
http://frustrate
we know that we can allow some IPS with out authentication using Allow from IP:
Order allow,deny
Allow from 192.168.1.5
Satisfy any
AuthName "LDAP Authentication"
AuthType Basic
AuthBasicProvider ldap
AuthzLDAPauthoritative off
AuthLDAPURL ldap://1
I have tried use what you just suggest:
RewriteCond %{REMOTE_ADDR} ^192\.168\.1\.*$
RewriteCond %{REMOTE_ADDR} !^192\.168\.1\.4$
RewriteCond %{REMOTE_ADDR} !^192\.168\.1\.5$
RewriteCond %{REMOTE_ADDR} !^192\.168\.1\.6$
But it didn't work.
I want to redirect all the inside network IPs to an error page except some IPs,
A condition like this:
if ( IP_from_Network = 192.168.1.0 and ((IP != 192.168.1.4) or (IP !=
192.168.1.5) or (IP != 192.168.1.6)) )
{
redirect to an error page
}
so I' trying to achieve this using RewriteEngine:
R
I have managed to redirect unwanted users using Rewrite engine:
RewriteEngine on
RewriteCond %{REMOTE_ADDR} ^192\.168\.1\.7$ [NC]
RewriteCond %{REQUEST_URI} ^/protected/.* [NC]
RewriteRule ^(.*)$ - [R=404,L]
Can I use this configuration with Drupal and moodle
sorry I send it a wrong message this should be on squid mailing-
list
Hello
we all know that access.log file logs the access Info of Squid, something like
that:
125213512.746 41762 192.168.1.17 ..
125213513.746 47616 192.168.1.18 ..
and
we all know that squid use the file /etc/resolv.conf to determine the
DNS server it is dealing wit
> 192.168.1.2 can always access, regardless of LDAP?
Yes
> 192.168.1.7 can never access, regardless of LDAP?
Yes, but what I really want is to do the forbidden of access using
authorization(Require tag)
not authentication (allow tag)
something like that:
allow from 192.168.1
Require 192.168.1.2
s
Thanks for your reply, I know about satisfy, but as I mentioned before, I want
different Authorization for internal users and external Users:
For internal Users : Require IP IP_Address
for External Users: authorization using LDAP
How can I achieve this?
with Satisfy Any
Can I use different Re
My purpose for this question because I want different Authorization for
internal users and external Users:
For internal Users : Require IP IP_Address
for External Users: authorization using LDAP
First, I may ask the question in a different way: can we have two defined
Directory tag for one directory?
I want to deal with users differently according to there source IP:
Can I use different Directory to achieve this, something like that:
- users with source 192.168.1
Order Deny,All
this won't help if the USER is outside the Network and have to use LDAP, it is
surely doesn't have the IP 192.168.1.2
Thanks for your reply but I want a dynamic solution, this is a static solution
but this will ask for authentication,I don't want to be asked for
authentication on both 192.168.1.2 and 192.168.1.7
I want to allow a directory " /var/www/html/ldap" to two users according to IPs
(192.168.1.2 192.168.1.7):
Order allow,deny
Allow from 192.168.1.2 192.168.1.7
Satisfy any
AuthName "LDAP Authentication"
AuthType Basic
AuthBasicProvider ldap
AuthzLDAPauth
sorry there is an error in the last message(in config):
Order allow,deny
Allow from 192.168.1.2 192.168.1.7
Satisfy any
AuthName "LDAP Authentication"
AuthType Basic
AuthBasicProvider ldap
AuthzLDAPauthoritative off
AuthLDAPURL ldap://192.168.1.3/d
No thanks alot, I have received it (the rar folder) , and I will read it in
details, Thanks a lot for your help :)
According to this page:
http://httpd.apache.org/docs/current/mod/mod_authz_host.html , we can authorize
the users after Authentication, Is this true?
My problem is I'm trying to authenticate all my users (using LDAP) except some
IPs, it have worked will:
Order allow,deny
Allow fr
Dear Richard Thanks for yor reply
> At a content delivery level, apache and squid are almost
> antithetical. So, while squid may find it desirable/necessary to
> play DNS games as part of meeting its content delivery goals, that's
> not something apache needs to do (since if you need to play the
Thanks for your reply again. but the css and the Images ( all the page content
folder ) aren't included in your reply can you sent them please :)
Thanks alot for your help, I will try to understand your answer :) and I hope
it will help me
sorry, I don't understand all of your answer, especially about the 2nd
question, In Squid to set a custom DNS they add one line to the squid.conf file:
dns-server IP_Address
for example:
dns_server 192.168.1.2
and all DNS queries will go to this server(192.168.1.2).
Is there any thing s
I have read about Authoriztion in Apache:
Require host example.org
Require host .net example.edu
This configuration will cause
Apache to perform a double reverse DNS lookup on the client IP
address, regardless of the setting of the HostnameLookups directive.
1- What is the DNS that
about the session/cookies solution you have said:
> You
> can base your logic on the IP address of the sender and either send
> them to a login screen or directly to the application.
How can I do this, Do I have to write a shell script or something like that, is
there any helpful tutorial?
Thanks for your reply
I have done some programming and my DB I have mention is like this:
User IP
Mark 10.10.10.1
Mike 10.10.10.2
Karl 10.10.10.3
- so can apache do a sql query to this DB and if the IP of the user is found in
this DB, don't ask him for the auth
what I really want is to deploy single sign on, I have authenticates users
using ieee802.1x and put the authenticated users in a DB, BUT I authenticate
only the inside ( inside my network ) users, and I don't want apache to
reauthenticate them, I want apache only to authenticate the outside user
Hello
we know that we can protect some pages in our apache server using
authentication:
http://httpd.apache.org/docs/2.2/howto/auth.html
but what if I have already authenticate the users using something else and add
this users to a DB, Is there a way to configure Apache to do a query to the
D
31 matches
Mail list logo