Red Hat Server Tux 2.1 Instrukcja Użytkownika Strona 23

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 28
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów
Przeglądanie stron 22
Chapter 4. Security
TUX is designed to have very strict security. This is possible because the assistant user-space
daemons is used to handle the complex exceptions.
TUX only serves a file if
1. The URL does not contain ?.
2. The URL does not start with /.
3. The URL points to a file that exists.
4. The file is world-readable.
1
5. The file is not a directory.
1
6. The file is not executable.
1
7. The file does not have the sticky-bit set.
1
8. The URL does not contain any forbidden substrings such as ..
1
1. Configurable through the sysctl parameters in /proc/sys/net/tux
1. Configurable through the sysctl parameters in /proc/sys/net/tux
1. Configurable through the sysctl parameters in /proc/sys/net/tux
1. Configurable through the sysctl parameters in /proc/sys/net/tux
1. Configurable through the sysctl parameters in /proc/sys/net/tux
23
Przeglądanie stron 22
1 2 ... 18 19 20 21 22 23 24 25 26 27 28

Komentarze do niniejszej Instrukcji

Brak uwag