|
The [Httpd] section of conf/texis.ini controls the
Texis Monitor Web Server. This is a minimal web server primarily
intended for certain standalone Windows applications. Most
environments (e.g. Unix) should use the vhttpd web server instead.
- Run Level
-
Whether to run the Texis Monitor Web Server or not. Set to 1 to run,
0 (default) not to run. Added in version 4.02.1036450486 Nov 4 2002.
- Port
-
The TCP port to listen to. Default 80.
If SSL Engine is set to
on, the default is 443 instead, since
the server will be listening for HTTPS not HTTP requests.
Added in version 4.02.1036450486 Nov 4 2002.
- Document Root
-
The document root directory to server documents from. Default is
htdocs in the Texis install dir. Must be an absolute path.
Added in version 4.02.1036450486 Nov 4 2002.
- Transfer Log
-
Path to log file for transfers. Default is
logs/transfer.log
in the Texis install dir. Must be absolute. Added in version
4.02.1036450486 Nov 4 2002.
- Types Config
-
Extension-to-Content-Type config file. Relative to install dir if
not absolute path. Default is
%INSTALLDIR%/conf/mime.types.
Added in version 5.01.1251952000 20090903.
- Encodings Config
-
Extension-to-Content-Encoding config file. Relative to install dir if
not absolute path. Default is
%INSTALLDIR%/conf/mime.encodings.
Added in version 5.01.1251952000 20090903.
- Max Backlog
-
The maximum backlog of pending connections to let the OS keep pending.
Default is OS dependent. Added in version 4.02.1036450486 Nov 4 2002.
- Timeout
-
The network timeout in seconds. Note that per-script Vortex timeout
applies when Vortex scripts are running. Default is 30 seconds.
Added in version 4.02.1036450486 Nov 4 2002.
- Bind Address
-
The local IP address to bind to. Default is any, i.e. allow incoming
connections from anywhere. Added in version 4.02.1036450486 Nov 4 2002.
- User
-
Windows only: local user to run CGI
texis as. Default is
same user as the running monitor server process. See
discussion of the Vortex <exec> option USER for caveats
and permission requirements. Added in version 4.04.1071892000 20031219.
- Pass
-
Windows only: password to login User. Required if
User is set. Note: password is in plain text; use
EncPass setting instead. Overrides EncPass. Added in
version 4.04.1071892000 20031219.
- EncPass
-
Windows only: encrypted password to login User. Create by
running monitor -E from the command-line. Added in version
4.04.1071892000 20031219.
- Fast Logon
-
Windows only: use fast logon method for User. Not
recommended; see discussion of the Vortex
<exec> flag
FASTLOGON for caveats and permission requirements. Added in
version 4.04.1071892000 20031219.
- Max Clients
-
The maximum number of simultaneous connections (clients) allowed.
Default is 32. Added in version 4.02.1036450486 Nov 4 2002.
- Max Header Size
-
The maximum total HTTP header size to accept, in bytes. Default is 4096.
Added in version 4.02.1036450486 Nov 4 2002.
- Live Output
-
Set to 1 to propagate CGI
texis output "live", i.e. do not
delay until server buffer is full. Default is 1.
Added in version 5.01.1172190000 20070222.
- Vortex Path
-
The URL path to interpret as Vortex scripts. Default none.
Typically set to /texis. Added in version 4.02.1036450486
20021104. While the overall path is a prefix, each path component
must match fully to requests: e.g. given the Vortex Path
"/texis", the URL request "/texis/subdir/script"
will run the script "subdir/script", but the URL request
"/texisation/subdir/script" will not run a script (i.e. will
be treated as a flat file request unless otherwise mapped). Note that
currently scripts are run via a separate CGI process, not directly as
vhttpd does.
Amongst the standard CGI environment variables, in version 6 and later
the variable HTTPS is set to on if SSL Engine is
on. It is unset if SSL Engine is optional or
off: this allows scripts that use HTTPS to compute the
scheme (protocol) prefix to the request URL to work. If the response
will be secure/SSL, i.e. SSL Engine is on, or
optional and the connection was RFC 2817 upgraded, the variable
SSL_PROTOCOL will be set to the SSL protocol in use: one of
SSLv2, SSLv3, or TLSv1. Note that the
request might have been insecure, e.g. if SSL Engine is
optional and the connection was upgraded on the main request
instead of an earlier (OPTIONS) request.
- Vortex By Ext Path
-
The URL path to interpret as Vortex scripts, by extension. A
request in this path with a "subdirectory" component that ends in
one of the non-empty Vortex Source Extensions or
.vtx
will be run as a Vortex script. Typically set to /; e.g. the
request "/dir/subdir/script.vs/func.html" would run the
script dir/subdir/script.vs in the ScriptRoot dir.
Added in version 5.01.1182883000 20070626. Note that Vortex
Source Extensions typically only contains non-empty values
(e.g. .vs) in Version 6.
- Texis Exe
-
The executable to run Vortex scripts. Default is
texis.exe
in the install dir for Windows, or bin/texis in the install dir
for Unix. Added in version 4.02.1036450486 Nov 4 2002.
- Index Files
-
What files to send as a directory's contents, as a space-separated list.
Default is
index.html for Unix, and index.html index.htm for
Windows. Added in version 4.02.1036450486 Nov 4 2002.
- Directory Indexing
-
Whether to list a directory's contents and links when no index file
is present. Default is on (1); set to 0 for off.
Added in version 4.02.1036450486 Nov 4 2002.
- Directory Robots Index
-
Whether the
<meta> robots tag on automatic directory index
pages should indicate that the page should be indexed by web crawlers
or not. The default is 0 (noindex for no indexing); 1
generates index so that crawlers do index the page. Added in
version 5.01.1225747000 20081103.
- Directory Robots Follow
-
Whether the
<meta> robots tag on automatic directory index
pages should indicate that the pages' links should be followed by web
crawlers or not. The default is 1 (follow); 0 generates
nofollow so that crawlers do not follow the pages' links.
Added in version 5.01.1225747000 20081103.
- Multi Views
-
If on or non-zero, allow content-negotiated variant files to be
served. With this option enabled, if a requested file is not found as
named, files with the same name but additional recognized file
extensions (for MIME types and/or encodings) will be searched for.
The files will be ranked according to the client's
Accept-... header preferences, and the highest-ranked file will
be served. Applies to implicit Index Files files too. For
example, a request for "/dir/file" might return
"/dir/file.html", "/dir/file.txt.gz" etc. If
variant(s) are found but are not deemed acceptable according to the
client's Accept-... headers, a 406 Not Acceptable
response may result. Disabled by default. Currently, only the
Accept-Encoding client header is respected. Added in version
5.01.1251952000 20090903.
- Allow File Mask
-
Only allow access to files in Document Root with at least one of
these permission bits set. Note that files must still be accessible
by User (if set). The default is
o=r, i.e. files must
have other-read permission set to be accessible.
Added in version 5.01.1147373599 20060511.
- Allow Dir Mask
-
Only allow access to directories in Document Root with at
least one of these permission bits set. Note that directories must
still be accessible by User (if set). The default is
o=r, i.e. directories must have other-read permission set to be
accessible. Added in version 5.01.1147373599 20060511.
- Pass Env
-
Space-separated list of environment variables to pass through from
the web server's environment to the Vortex CGI environment. Default
is none. Only a minimal CGI environment is normally set for security.
This setting can be used to pass through variables like
LD_LIBRARY_PATH
if needed. Use with caution. Added in version 4.02.1047673208 Mar 14 2003.
In addition, all "settings" in the [Httpd Set Env]
section are taken as environment variable assignments to pass to the
CGI environment. This allows environment variables which aren't set
in the web server's environment to be set in the CGI environment.
Added in version 4.02.1047663381 Mar 14 2003.
- Bad Content Length Work Around
-
If bit 0 is set, try to read any extra socket input after the
request. This works around a Microsoft Internet Explorer bug that
causes connection-reset browser errors. If bit 1 is set, log such
events. Default is 1. Added in version 5.01.1159558662 20060929.
- Trace Requests
-
Enable debug tracing of monitor web server requests to
monitor.log. This is an integer combination of the following
bit flags to determine what is logged (same format as
<urlcp verbose>):
- bit 0
- - Responses read
- bit 1
- - Requests sent
- bit 2
- - Headers read
- bit 3
- - Headers sent
The default is 0, i.e. no logging. Generally only set at the request
of tech support. Added in version 5.01.1184720000 20070717.
- Trace Auth
-
Enable debug tracing of authorization in monitor web server
requests. This is an integer combination of bit flags in the same
format as the Vortex <urlcp traceauth> setting. Generally
only set at the request of tech support. Added in version
5.01.1184720000 20070717.
- Max Conn Requests
-
Maximum number of requests to service on a Keep-Alive connection to
the monitor web server. The default is 100. -1 is unlimited.
Added in version 6.
- Max Conn Lifetime
-
Maximum lifetime of a Keep-Alive connection to the monitor web
server, in seconds. The default is 60. -1 is unlimited. Added in
version 6.
- Max Conn Idle Time
-
Maximum idle (not-in-use) time of a Keep-Alive connection to the
monitor web server, in seconds. The default is 5. -1 is unlimited.
Added in version 6.
- SSL Engine
- Whether to use secure sockets (SSL) for incoming
monitor web server connections. One of three values:
-
off: Listen for HTTP requests, do not use SSL.
None of the following SSL settings are used. -
optional: Listen for HTTP requests, but upgrade to
HTTPS (SSL) if client agrees via Upgrade header. -
on: Listen for HTTPS requests (use SSL).
The default is off. If set to on, the default
Port value becomes 443 instead of 80. Added in version 6. If
there is a problem initializing the SSL layer, an error such as
"SSL disabled for web server due to previous errors" may
result in monitor.log, after other errors (e.g. failed to load
certificate): the web server will continue to run, but as if
SSL Engine was off.
- SSL Pass Phrase Dialog
- How to prompt for passwords when needed
for loading password-protected certificate keys for the monitor web
server. Can be:
-
off: Do not prompt; password-protected keys will not
be loaded -
builtin: Use the built-in prompter: ask for password
at Texis Monitor startup. This requires that the monitor be
started interactively, i.e. from the command line.
The default is off, so that the monitor may always start
unimpeded, even from the command line when password prompting might
be possible.
If a server is started with a password-protected key, but SSL
Pass Phrase Dialog is set to off, an error such as "
Cannot obtain password to decrypt SSL certificate key
`.../server.key': [Httpd] SSL Pass Phrase Dialog is `off'" may
result in monitor.log. If SSL Pass Phrase Dialog is
set to builtin and an incorrect password is given when the
monitor server is started (and prompts the user), the error "
Cannot parse SSL certificate key `.../server.key': Bad password"
may result in the log and the error "Failed to load SSL
certificate key .../server.key" may be output to the user starting
the monitor.
Note: if builtin is set, the monitor must be
started manually on the command line, so that it can prompt for any
needed password(s). Setting added in version 6. See also the
[Scheduler] SSL Pass Phrase Dialog setting for the schedule/license
server, here.
- SSL Certificate File
- The path to the SSL server certificate
file (in PEM format) to use for the monitor web server. A
certificate file is required if SSL Engine is not
off.
If SSL Certificate Key File is unset, the corresponding
certificate key will also be loaded from this file. Can also be the
same file as SSL Certificate Chain File (if the certificate is
in there). Added in version 6.00.1317693000 20111003 (note that in
earlier version 6 releases, SSL Certificate Chain File was
used to load the server certificate, and the certificate key was
never loaded from that file). The default certificate file is
%INSTALLDIR%/conf/ssl/certs/server.cert.
The server certificate file is provided by the administrator. One
way to create a certificate and unencrypted private key if they do
not exist is with the command:
/usr/local/morph3/etc/openssl req -new -x509 -nodes -days 3653 \
-out server.cert -keyout server.key
See http://www.openssl.org/ for more on the openssl
command.
If the server certificate file is missing, an error such as "
Cannot read SSL certificate .../server.cert: No such file or
directory" may result in monitor.log.
- SSL Certificate Key File
- The path to the SSL certificate
private key file (in PEM format) that corresponds to the SSL
Certificate File certificate set for the monitor web server. This
file is provided by the administrator. A certificate key is
required if SSL Engine is not
off. If this setting is
unset (the default), the certificate key is assumed to be
concatenated into SSL Certificate File. Added in version 6
(note that in versions prior to 6.00.1317693000 20111003, the
default was %INSTALLDIR%/conf/ssl/keys/server.key).
Note: This file should be accessible only to the Texis Monitor
server, i.e. the monitor owner. See the openssl
example above for an example of how to create this file if it does
not exist.
If the SSL certificate key is password-protected, SSL Pass
Phrase Dialog will need to be set to "builtin" to allow
the monitor to prompt for the password at server start; otherwise an
error such as "Cannot obtain password to decrypt SSL
certificate key" will result.
If the certificate key file is missing, an error such as "
Cannot read SSL certificate key `.../server.key': No such file or
directory" may result in monitor.log.
- SSL Certificate Chain File
- Optional path to monitor web server
certificate's CA (certificate authority) chain file, PEM format.
This file contains the chain of CA certificates (if any) for the
server certificate, in order, starting with the CA certificate that
signed the server certificate, the CA certificate that signed that
CA certificate, etc. up through the root/self-signed CA certificate.
The server certificate itself may also optionally be combined into
this file, if it is the first certificate listed and SSL
Certificate File is also set to this file: this allows the server
plus chain certificates to all be in one file. Default is unset (no
CA chain). Added in version 6 (note that in versions prior to
6.00.1317693000 20111003, this setting also loaded the server
certificate).
Setting a CA chain for the server certificate may be needed so that
a web browser can trust the server. If the server certificate was
not signed by a well-known CA that the browser already trusts, the
browser might give an SSL/certificate/security error to the user.
Supplying the CA chain - up through a well-known root CA
certificate - lets the browser follow that chain to the well-known
root CA that it trusts, avoiding the security error.
Note that this setting only sets the server certificate CA chain; it
does not alter what CA certificates the server trusts for
authentication of clients (see SSL CA Certificate File).
Note also that if further CA certificates are needed to finish the
server certificate's chain (due to SSL Certificate Chain File
being unset or incomplete), the server may automatically obtain them
from the SSL CA Certificate File. Since SSL CA
Certificate File certificates are trusted whereas SSL
Certificate Chain File certificates are not, it is best to add all
needed server certificate chain certificates directly via SSL
Certificate Chain File, and not implicitly via SSL CA
Certificate File. For example, say the server certificate's issuer
is a well-known Thawte certificate, but the server also wants to do
authentication of clients and only trust clients with certificates
issued by a local issuer (say Acme Co.). The Acme certificate
should be the only certificate in the SSL CA Certificate File
file - so that the server trusts only client certificates issued by
Acme. The well-known Thawte certificate should only be in SSL
Certificate Chain File - so that browsers can verify the server.
If the Thawte certificate were in SSL CA Certificate File, the
server chain would still be completed correctly, but the server
would start trusting all clients with Thawte certificates - which
is not what is desired.
- SSL CA Certificate File
- Optional file with trusted CA
certificates (PEM format), used by monitor web server for
authentication of clients. When such authentication is enabled (see
SSL Verify Client), clients are asked to present a
certificate; the certificate is trusted only if its root certificate
is signed by one of the CAs listed in this file. Note that this
file may also possibly be used for automatic completion of the
server certificate CA chain, if not all needed CA certificates are
found in SSL Certificate Chain File; see the SSL
Certificate Chain File setting discussion on why this is not
usually the best practice.
The default SSL CA Certificate File value is unset. Added in
version 6.00.1318364000 20111011.
- SSL CA DN Request File
- Optional file with CA issuer
certificates (PEM format) whose names are sent to the client when
the client certificate is requested by the monitor web server,
during authentication of clients (see SSL Verify Client). The
client can choose the certificate it wishes to return based on these
acceptable issuer CAs. Some browsers will show the user this list,
as an aid in choosing which client certificate to return
(i.e. preferably one signed by one of these issuers). If this
setting is unset (the default), the list of CA issuer names sent to
the client is obtained from SSL CA Certificate File instead.
Note that while this setting (SSL CA DN Request File) sets the
list of requested CAs, it does not set the list of CAs that
are actually trusted by the server - that is controlled by
SSL CA Certificate File. Usually these lists are the same,
and hence this setting may be left unset. But sometimes they
differ, e.g. if client certificates are signed by intermediate CAs:
the requested list may need to be set differently with this setting,
to prompt the user more correctly. Added in version 6.00.1318364000
20111011.
- SSL Verify Client
- Whether the monitor web server should ask for
and verify SSL client certificates. Verification is enabled if
on, disabled if off (the default).
If on and a client certificate cannot be obtained or
verified, the connection will be terminated with a server error such
as "Cannot verify certificate from
host:port: reason at depth N". The
specific reason may vary;
see the SSL Client/Server Certificate Verification appendix of the Vortex
manual for a full list. The client/browser may see an error such as
"SSL peer was unable to negotiate an acceptable set of
security parameters / ssl_error_handshake_failure_alert", or
"Cannot complete SSL handshake: ... alert bad certificate".
The Apache-compatible setting values none and require
are also permitted, as aliases for on and off,
respectively. The Apache value optional is also permitted -
client certificates will be requested and must be verified if
presented, but if no certificate is presented the connection
continues. (This is a less secure value but may be useful for
debugging, development etc.)
When asking for the client certificate, the server will present a
list of names of certificate authorities (CAs): the client may
choose which certificate to return based on this list. This list is
obtained from SSL CA DN Request File if set, or SSL CA
Certificate File if the former is unset.
The SSL Verify Client setting was added in version
6.00.1318364000 20111011.
- SSL Protocol
- Which SSL protocols to use when SSL is active for
the monitor web server. One or more of the space-separated
protocols
SSLv2, SSLv3, TLSv1 or all for
all protocols. Each protocol may be prefixed with + to add
the protocol to the enabled list, - to remove, or = to
set (enable just this protocol). The default is all -SSLv2,
i.e. enable all protocols except SSL/2.0. Added in version 6.
Copyright © Thunderstone Software Last updated: Sun Mar 17 21:14:49 EDT 2013
|