본문 바로가기
조회 수 31 추천 수 0 댓글 0

단축키

Prev이전 문서

Next다음 문서

단축키

Prev이전 문서

Next다음 문서

Apache 2.4 이상 버전에서 403 에러가 발생. error.log 를 보니 다음과 같은 에러가 있었다.

 

[Tue Dec 11 17:49:19.350384 2012] [authz_core:error] 
[pid 5308:tid 1576] [client 127.0.0.1:53603] AH01630: 
client denied by server configuration: /DOCUMENT_ROOT

 

 


아마도 우분투를 업그레이드하면서 (2.2에서 2.4로 업그레이드) 기존에쓰던 conf 파일 옵션값이 문제를 일으킨모양이다.

 

apache 2.2

<Directory /DOCUMENT_ROOT>

   ~~~

    Order allow,deny

    Allow from all

</Directory>

 

apache 2.4 최신

<Directory /DOCUMENT_ROOT>

    ~~~

    Require all granted

</Directory>

 

 

 

 

 

 

 

 

아래는 apache 공식사이트 설명문서다.

 

https://httpd.apache.org/docs/2.4/upgrading.html

 

 

 

 

2.2 configuration:

 Order deny,allow Deny from all 

2.4 configuration:

 Require all denied 

In this example, there is no authentication and all requests are allowed.

2.2 configuration:

 Order allow,deny Allow from all 

2.4 configuration:

 Require all granted 

In the following example, there is no authentication and all hosts in the example.org domain are allowed access; all other hosts are denied access.

2.2 configuration:

 Order Deny,Allow Deny from all Allow from example.org 

2.4 configuration:

 Require host example.org 

In the following example, mixing old and new directives leads to unexpected results.

Mixing old and new directives: NOT WORKING AS EXPECTED

 DocumentRoot "/var/www/html" <Directory "/"> AllowOverride None Order deny,allow Deny from all </Directory> <Location "/server-status"> SetHandler server-status Require local </Location> access.log - GET /server-status 403 127.0.0.1 error.log - AH01797: client denied by server configuration: /var/www/html/server-status 

Why httpd denies access to servers-status even if the configuration seems to allow it? Because mod_access_compat directives take precedence over the mod_authz_host one in this configuration merge scenario.

This example conversely works as expected:

Mixing old and new directives: WORKING AS EXPECTED

 DocumentRoot "/var/www/html" <Directory "/"> AllowOverride None Require all denied </Directory> <Location "/server-status"> SetHandler server-status Order deny,allow Deny from all Allow From 127.0.0.1 </Location> access.log - GET /server-status 200 127.0.0.1 

So even if mixing configuration is still possible, please try to avoid it when upgrading: either keep old directives and then migrate to the new ones on a later stage or just migrate everything in bulk.

In many configurations with authentication, where the value of the Satisfy was the default of ALL, snippets that simply disabled host-based access control are omitted:

2.2 configuration:

 # 2.2 config that disables host-based access control and uses only authentication Order Deny,Allow Allow from all AuthType Basic AuthBasicProvider file AuthUserFile /example.com/conf/users.passwd AuthName secure Require valid-user 

2.4 configuration:

 # No replacement of disabling host-based access control needed AuthType Basic AuthBasicProvider file AuthUserFile /example.com/conf/users.passwd AuthName secure Require valid-user 

In configurations where both authentication and access control were meaningfully combined, the access control directives should be migrated. This example allows requests meeting both criteria:

2.2 configuration:

 Order allow,deny Deny from all # Satisfy ALL is the default Satisfy ALL Allow from 127.0.0.1 AuthType Basic AuthBasicProvider file AuthUserFile /example.com/conf/users.passwd AuthName secure Require valid-user 

2.4 configuration:

 AuthType Basic AuthBasicProvider file AuthUserFile /example.com/conf/users.passwd AuthName secure <RequireAll> Require valid-user Require ip 127.0.0.1 </RequireAll> 

In configurations where both authentication and access control were meaningfully combined, the access control directives should be migrated. This example allows requests meeting either criteria:

2.2 configuration:

 Order allow,deny Deny from all Satisfy any Allow from 127.0.0.1 AuthType Basic AuthBasicProvider file AuthUserFile /example.com/conf/users.passwd AuthName secure Require valid-user 

2.4 configuration:

 AuthType Basic AuthBasicProvider file AuthUserFile /example.com/conf/users.passwd AuthName secure # Implicitly <RequireAny> Require valid-user Require ip 127.0.0.1 



List of Articles
번호 분류 제목 글쓴이 조회 수 날짜
공지 덕질 공통 이용규칙 및 안내 (업데이트중+ 2024-04-13) 😀컴덕824 5379 2024.04.14
공지 1000P를 모으면 다이소 상품권 1000원을 신청할 수 있습니다. file Private 5369 2024.02.14
4779 일반 Synology의 4 베이 NAS 장비 "DiskStation DS416j" 😀익명860 1365 2016.02.08
4778 일반 태블릿 PC의 충전을하면서 주변 기기를 사용할 수있는 OTG 지원 USB 허브 😀익명950 1286 2016.02.08
4777 일반 usb 3.0 포트를 사용하여 윈도우7 을 설치할 때하기 ( 인텔이 제공하는 유틸 ) 😀익명218 1324 2016.02.08
4776 일반 VMware 리믹스 OS 설치 방법 😀익명630 2278 2016.02.08
4775 일반 AERTsr64.exe 은 무엇인가 (Andrea's APO Access Service) 😀익명763 1254 2016.02.08
4774 일반 AMD 크림슨 드라이버 사용하시는분들 꼭 읽어보세요!! 😀익명835 1307 2016.02.08
4773 일반 노턴 백신 OEM으로 45개월 (1350일) 사용하기 😀익명662 1602 2016.02.08
4772 일반 블로그 사이드/아래에 공유버튼 넣기(삽입) 😀익명550 958 2016.02.08
4771 일반 주식수익 얼마나 났나요? 자랑해보시지요~^^ 20프로이상은 있을듯합니다 😀익명686 700 2016.02.15
4770 일반 카페베네 상장 난항에 투자자 눈물 😀익명092 685 2016.02.15
4769 일반 주식, 욕심은 화를 부르고. 그 화는 고스란히 가족들에게 짜증을 부릴겁니다 😀익명105 642 2016.02.22
4768 일반 원익IPS 추천합니다 😀익명789 583 2016.02.22
4767 일반 장이 너무 안좋네요 ㅜㅜ 😀익명780 626 2016.02.22
4766 일반 주식투자와 관련된 주식명언 😀익명023 914 2016.02.22
4765 일반 i5-6600 i5-6500 비교 1 😀익명451 1350 2016.02.22
4764 일반 ssd좀봐주세요 2 😀익명480 811 2016.02.27
4763 일반 크라운제과 어떻게 보시나요? 😀익명240 383 2016.02.28
4762 일반 흑자예상하며 기다린보람이 있군 😀익명123 388 2016.02.28
4761 일반 세계 주식 주요 지수 보는곳 입니다.모르시는분들을 위해 😀익명057 561 2016.02.28
4760 일반 한 2월 말쯤 총선테마가 시작될걸로 예상합니다. 😀익명623 485 2016.02.28
목록
Board Pagination Prev 1 2 3 4 5 6 7 8 9 10 ... 239 Next
/ 239