httpd-cvs mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From Brian Behlendorf <br...@hyperreal.com>
Subject cvs commit: apache/conf access.conf-dist
Date Mon, 21 Oct 1996 23:02:33 GMT
brian       96/10/21 16:02:33

  Modified:    conf      access.conf-dist
  Log:
  Reviewed by:	Brian Behlendorf
  
  Redirected requests to a virthost which can be filtered or blackholed
  as desired, in case load gets too great.  Suggested by Dean Gaudet.
  
  Revision  Changes    Path
  1.9       +3 -3      apache/conf/access.conf-dist
  
  Index: access.conf-dist
  ===================================================================
  RCS file: /export/home/cvs/apache/conf/access.conf-dist,v
  retrieving revision 1.8
  retrieving revision 1.9
  diff -C3 -r1.8 -r1.9
  *** access.conf-dist	1996/10/08 21:12:49	1.8
  --- access.conf-dist	1996/10/21 23:02:31	1.9
  ***************
  *** 1,5 ****
    # access.conf: Global access configuration
  ! # $Id: access.conf-dist,v 1.8 1996/10/08 21:12:49 brian Exp $
    # Online docs at http://www.apache.org/
    
    # This file defines server settings which affect which types of services
  --- 1,5 ----
    # access.conf: Global access configuration
  ! # $Id: access.conf-dist,v 1.9 1996/10/21 23:02:31 brian Exp $
    # Online docs at http://www.apache.org/
    
    # This file defines server settings which affect which types of services
  ***************
  *** 58,69 ****
    # There have been reports of people trying to abuse an old bug from pre-1.1
    # days.  This bug involved a CGI script distributed as a part of Apache.
    # By uncommenting these lines you can redirect these attacks to a logging 
  ! # script on www.apache.org.  Or, you can record them yourself, using the script
    # support/phf_abuse_log.cgi.
    
    #<Location /cgi-bin/phf*>
    #deny from all
  ! #ErrorDocument 403 http://www.apache.org/phf_abuse_log.cgi
    #</Location>
    
    # You may place any other directories or locations you wish to have
  --- 58,69 ----
    # There have been reports of people trying to abuse an old bug from pre-1.1
    # days.  This bug involved a CGI script distributed as a part of Apache.
    # By uncommenting these lines you can redirect these attacks to a logging 
  ! # script on phf.apache.org.  Or, you can record them yourself, using the script
    # support/phf_abuse_log.cgi.
    
    #<Location /cgi-bin/phf*>
    #deny from all
  ! #ErrorDocument 403 http://phf.apache.org/phf_abuse_log.cgi
    #</Location>
    
    # You may place any other directories or locations you wish to have
  
  
  

Mime
View raw message