Apache Security - Ivan Ristic [209]
attacks against, Attacks Against Access Control
authentication and network access, combined, Combining authentication with network access control
authentication methods, Overview, Overview, Authentication Methods, Basic Authentication, Digest Authentication, Form-Based Authentication, Referrer Check Flaws
basic, Basic Authentication
Digest, Digest Authentication
factors (authentication types 1-;3), Overview
flawed, real-life example of, Referrer Check Flaws
form-based, Form-Based Authentication
two-factor authentication, Overview
basic plaintext authentication, Basic Authentication Using Plaintext Files, Basic Authentication Using Plaintext Files, Working with groups
groups, Working with groups
htpasswd utility, Basic Authentication Using Plaintext Files
certificate-based authentication, Certificate-Based Access Control
combining authentication modules, Combining multiple authentication modules
DBM file authentication, Basic Authentication Using DBM Files, Basic Authentication Using DBM Files, Digest Authentication
dbmmanage problems, Basic Authentication Using DBM Files
htdigest for password database, Digest Authentication
Digest authentication, Digest Authentication, Digest Authentication
mod_auth_digest module required, Digest Authentication
network, Network Access Control, Using environment variables
environment variables, Using environment variables
notes on, Final Access Control Notes
overview, Overview
proxy, Proxy Access Control, Reverse proxies, Front door
central and reverse proxies, Front door
reverse proxies, Reverse proxies
request methods, limiting, Limiting request methods
SSO, Single Sign-on, Web Single Sign-on
web-only, Web Single Sign-on
accountability security goal, Security Definitions
AddHandler directive, Using PHP as a CGI, Restricting mod_security to process dynamic requests only
AddType directive, Restricting mod_security to process dynamic requests only
Advanced Encryption Standard (AES), Symmetric Encryption
AES (Advanced Encryption Standard), Symmetric Encryption
AgentLog directive (deprecated), Request Logging
Alan Ralsky DoS retribution, Denial of Service Attacks
Allow directive, Network Access Control
AllowEncodedSlashes directive, Changing Web Server Identity
AllowOverride directive, AllowOverride directive, Distributing Configuration Data
access file usage control, Distributing Configuration Data
antivirus, Clam AntiVirus program, File upload interception and validation
Apache, System-Hardening Matrix, Installation and Configuration, Installation and Configuration, Installation, Source or Binary, Downloading the source code, Downloading patches, Static Binary or Dynamic Modules, Static Binary or Dynamic Modules, Folder Locations, Installation Instructions, Testing the installation, Selecting modules to install, Selecting modules to install, Configuration and Hardening, Setting Up the Server User Account, Setting Apache Binary File Permissions, Setting Apache Binary File Permissions, Configuring Secure Defaults, Options directive, Options directive, AllowOverride directive, Enabling CGI Scripts, Logging, Setting Server Configuration Limits, Setting Server Configuration Limits, Setting Server Configuration Limits, Setting Server Configuration Limits, Preventing Information Leaks, Preventing Information Leaks, Changing Web Server Identity, Putting Apache in Jail, Putting Apache in Jail, Putting Apache in Jail, Using the chroot(2) Patch, Apache and SSL, Installing mod_ssl, Generating Keys, Generating a Certificate Signing Request, Configuring SSL, Configuring SSL, Supporting broken SSL clients, Securing the server private key, Ensuring reliable SSL startup, Preventing configuration mistakes, Preventing configuration mistakes, Per-request change of Apache