Apache HTTP Server /etc/apache2/conf-available/security.conf

原始 📋 Ubuntu 24.04 LTS (Noble Numbat) 58 行

适用于

当前查看:
Ubuntu 24.04 LTS (Noble Numbat)
相同于:
Debian 13 (Trixie)
其他版本:

详情

大小
58 行
MD5
332668933023a463046fa90d9b057193
SHA256
86296f2324bcc27790a80c863886fffd10d7a48b28587151e541f38136055b8b
/etc/apache2/conf-available/security.conf
# Changing the following options will not really affect the security of the
# server, but might make attacks slightly more difficult in some cases.

#
# ServerTokens
# This directive configures what you return as the Server HTTP response
# Header. The default is 'Full' which sends information about the OS-Type
# and compiled in modules.
# Set to one of:  Full | OS | Minimal | Minor | Major | Prod
# where Full conveys the most information, and Prod the least.
#ServerTokens Minimal
ServerTokens OS
#ServerTokens Full

#
# Optionally add a line containing the server version and virtual host
# name to server-generated pages (internal error documents, FTP directory
# listings, mod_status and mod_info output etc., but not CGI generated
# documents or custom error documents).
# Set to "EMail" to also include a mailto: link to the ServerAdmin.
# Set to one of:  On | Off | EMail
#ServerSignature Off
ServerSignature On

#
# Allow TRACE method
#
# Set to "extended" to also reflect the request body (only for testing and
# diagnostic purposes).
#
# Set to one of:  On | Off | extended
TraceEnable Off
#TraceEnable On

#
# Forbid access to version control directories
#
# If you use version control systems in your document root, you should
# probably deny access to their directories.
#
# Examples:
#
#RedirectMatch 404 /\.git
#RedirectMatch 404 /\.svn

#
# Setting this header will prevent MSIE from interpreting files as something
# else than declared by the content type in the HTTP headers.
# Requires mod_headers to be enabled.
#
#Header set X-Content-Type-Options: "nosniff"

#
# Setting this header will prevent other sites from embedding pages from this
# site as frames. This defends against clickjacking attacks.
# Requires mod_headers to be enabled.
#
#Header set Content-Security-Policy "frame-ancestors 'self';"

复制粘贴

curl:
curl https://exampleconfig.com/api/v1/config/original/332668933023a463046fa90d9b057193?hint=security.conf
wget:
wget -O security.conf https://exampleconfig.com/api/v1/config/original/332668933023a463046fa90d9b057193?hint=security.conf

给 AI Agent 用

<prompt><role>DevOps agent</role><source url='https://exampleconfig.com/api/v1/config/original/332668933023a463046fa90d9b057193?hint=security.conf' /><config><app>Apache HTTP Server</app><os>Ubuntu 24.04 LTS (Noble Numbat)</os><location>/etc/apache2/conf-available/security.conf</location><lines>58</lines><md5>332668933023a463046fa90d9b057193</md5><sha256>86296f2324bcc27790a80c863886fffd10d7a48b28587151e541f38136055b8b</sha256></config></prompt>

粘贴到 Claude、ChatGPT 或任何 AI 助手里。

安装 Apache HTTP Server

Alpine Linux

sudo apk add apache2

Debian

sudo apt update && sudo apt install apache2

Red Hat Enterprise Linux

sudo yum install httpd

Ubuntu

sudo apt update && sudo apt install apache2

文件位置

文件路径
/etc/apache2/conf-available/security.conf
目录
/etc/apache2/conf-available/
用途
系统级配置目录
说明
/etc/ 里的文件是系统级配置,影响所有用户。

FAQ

什么时候该用这个 security.conf?

用来恢复缺失的默认文件、确认发行版本带了什么,或拿你的 Apache HTTP Server config 做 diff。

怎么恢复 Apache HTTP Server 的默认配置?

下载文件,把 /etc/apache2/conf-available/security.conf 里的当前配置备份好,替换掉,然后 reload 或 restart Apache HTTP Server。

security.conf 适合直接上生产吗?

这是 Ubuntu 24.04 LTS (Noble Numbat) 的厂商默认配置,只能当基线。上生产前请检查安全和性能设置。

和其他 OS 版本有什么不同?

默认值会随发行版和版本变化,这份对应 Ubuntu 24.04 LTS (Noble Numbat)。

我可以用它来排查 Apache HTTP Server 吗?

可以。和你的配置做 diff 找出漂移,然后只恢复需要的段落。