Oracle® HTTP Server Administrator's Guide 10g Release 1 (10.1) Part Number B12255-01 |
|
|
View PDF |
This chapter provides answers to frequently asked questions about Oracle HTTP Server.
See Also:
"Frequently Asked Questions" in the Apache Server documentation. |
Documentation from the Apache Software Foundation is referenced when applicable.
Oracle HTTP Server has a default content handler for dealing with errors. You can use the ErrorDocument
directive to override the defaults.
See Also:
"ErrorDocument directive" in the Apache Server documentation. |
For HTTP, Oracle HTTP Server supports two types of virtual hosts: name-based and IP-based. HTTPS supports only IP-based virtual hosts.
If you are using IP-based virtual hosts for HTTP, then the customer has a virtual server listening on port 80 of a per-customer IP address. To provide HTTPS for these customers, simply add an additional virtual host for each user listening on port 4443 of that same per-customer IP address and use SSL directives, such as SSLRequireSSL to specify the per-customer SSL characteristics. Note that each customer can have their own wallet and server certificate.
If you are using name-based virtual hosts for HTTP, each customer has a virtual server listening on port 80 of a shared IP address. To provide HTTPS for those customers, you can add a single shared IP virtual host listening on port 4443 of the shared IP address. All customers will share the SSL configuration, including the wallet and ISP's server certificate.
See Also:
"Running Oracle HTTP Server as Root" for instructions on running Oracle HTTP Server with ports lesser than 1024. |
You can use the Oracle HTTP Server as a cache by setting the ProxyRequests
to "On" and CacheRoot
directives.
See Also:
" |
You can use multiviews, a general name given to the Apache server's ability to provide language and character-specific document variants in response to a request.
See Also:
"Multiviews" in the Apache Server documentation. |
You should use the Proxy directives, and not the Cache directives, to send proxy sensitive requests across firewalls.
Oracle HTTP Server is based on Apache version 1.3.28.
Oracle Database, 10g Release 1 (10.1) is still based on the 1.3.x stack from Apache organization.
You cannot apply the Apache security patches to Oracle HTTP Server for the following reasons:
openSSL
alerts, since Oracle has removed those components from the stack in use.mod_php
is not supported, however, you have the following two options:
mod_php
by yourself and use it. If there is a support question on any aspect of Oracle HTTP Server, you might be asked to reproduce the problem without mod_php
.The general idea is that all servers in a distributed Web site should agree on a single URL namespace. Every server serves some part of that namespace, and is able to redirect or proxy requests for URLs that it does not serve to a server that is "closer" to that URL. For example, your namespaces could be the following:
/app1/login.html /app1/catalog.html /app1/dologin.jsp /app2/orderForm.html /apps/placeOrder.jsp
We could initially map this namespace to two Web servers by putting app1
on server1 and app2
on server2. Server1's configuration might look like the following:
Redirect permanent /app2 http://server2/app2 Alias /app1 /myApps/application1 <Directory /myApps/application1> ... </Directory>
Server2's configuration is complementary. If you decide to partition the namespace by content type (HTML on server, JSP on server2), change server configuration and move files around, but do not have to make changes to the application itself. The resulting configuration of server1 might look like the following:
RedirectMatch permanent (.*) \.jsp$ http://server2/$1.jsp AliasMatch ^/app(.*) \.html$ /myPages/application$1.html <DirectoryMatch "^/myPages/application\d"> ... </DirectoryMatch>
Note that the amount of actual redirection can be minimized by configuring a hardware load balancer to send requests to server1 or server2 based on the URL.
There are many attacks, and new attacks are invented everyday. Following are some general guidelines for securing your site. You can never be completely secure, but you can avoid being an easy target.