Red Hat Server Tux 2.1 Manuel d'utilisateur Page 23

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 28
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 22
Chapter 4. Security
TUX is designed to have very strict security. This is possible because the assistant user-space
daemons is used to handle the complex exceptions.
TUX only serves a file if
1. The URL does not contain ?.
2. The URL does not start with /.
3. The URL points to a file that exists.
4. The file is world-readable.
1
5. The file is not a directory.
1
6. The file is not executable.
1
7. The file does not have the sticky-bit set.
1
8. The URL does not contain any forbidden substrings such as ..
1
1. Configurable through the sysctl parameters in /proc/sys/net/tux
1. Configurable through the sysctl parameters in /proc/sys/net/tux
1. Configurable through the sysctl parameters in /proc/sys/net/tux
1. Configurable through the sysctl parameters in /proc/sys/net/tux
1. Configurable through the sysctl parameters in /proc/sys/net/tux
23
Vue de la page 22
1 2 ... 18 19 20 21 22 23 24 25 26 27 28

Commentaires sur ces manuels

Pas de commentaire