Apache HTTP Server Konfiguration - Linux
/etc/apache2/conf-available/security.conf
Schnellaktionen
📥 Original herunterladen security.confKonfigurationsdatei-Informationen
Authentisch & Original
Unverändert security.conf von einer frischen Installation.
Linux-Distributions-Unterstützung
📋 Aktuell angezeigt: Ubuntu 24.04 LTS (Noble Numbat)
✓ Auch kompatibel:
Debian 12 (Bookworm),
⚠ Verschiedene Versionen:
Konfigurationsdatei-Inhalt
59 Zeilen
# Changing the following options will not really affect the security of the
# server, but might make attacks slightly more difficult in some cases.
#
# ServerTokens
# This directive configures what you return as the Server HTTP response
# Header. The default is 'Full' which sends information about the OS-Type
# and compiled in modules.
# Set to one of: Full | OS | Minimal | Minor | Major | Prod
# where Full conveys the most information, and Prod the least.
#ServerTokens Minimal
ServerTokens OS
#ServerTokens Full
#
# Optionally add a line containing the server version and virtual host
# name to server-generated pages (internal error documents, FTP directory
# listings, mod_status and mod_info output etc., but not CGI generated
# documents or custom error documents).
# Set to "EMail" to also include a mailto: link to the ServerAdmin.
# Set to one of: On | Off | EMail
#ServerSignature Off
ServerSignature On
#
# Allow TRACE method
#
# Set to "extended" to also reflect the request body (only for testing and
# diagnostic purposes).
#
# Set to one of: On | Off | extended
TraceEnable Off
#TraceEnable On
#
# Forbid access to version control directories
#
# If you use version control systems in your document root, you should
# probably deny access to their directories.
#
# Examples:
#
#RedirectMatch 404 /\.git
#RedirectMatch 404 /\.svn
#
# Setting this header will prevent MSIE from interpreting files as something
# else than declared by the content type in the HTTP headers.
# Requires mod_headers to be enabled.
#
#Header set X-Content-Type-Options: "nosniff"
#
# Setting this header will prevent other sites from embedding pages from this
# site as frames. This defends against clickjacking attacks.
# Requires mod_headers to be enabled.
#
#Header set Content-Security-Policy "frame-ancestors 'self';"
Download-Befehle
security.conf •
Lade die 100% original unveränderte Konfigurationsdatei herunter von Apache HTTP Server
Mit wget:
wget -O security.conf.example https://exampleconfig.com/api/v1/config/original/332668933023a463046fa90d9b057193?hint=security.conf
Mit curl:
curl https://exampleconfig.com/api/v1/config/original/332668933023a463046fa90d9b057193?hint=security.conf > security.conf.example
Verwandte Konfigurationsdateien
/etc/apache2/conf-available/security.conf
Apache HTTP Server · Debian 9 (Stretch)
/etc/apache2/conf-available/security.conf
Apache HTTP Server · Debian 9 (Stretch)
/etc/apache2/conf-available/security.conf
Apache HTTP Server · Debian 9 (Stretch)
/etc/apache2/conf-available/security.conf
APT · Ubuntu 24.04 LTS (Noble Numbat)
/etc/apache2/conf-available/security.conf
APT · Ubuntu 24.04 LTS (Noble Numbat)
/etc/apache2/conf-available/security.conf
APT · Ubuntu 24.04 LTS (Noble Numbat)