home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
OS/2 Spezial
/
SPEZIAL2_97.zip
/
SPEZIAL2_97.iso
/
ANWEND
/
ONLINE
/
SREFV12J
/
CONFIGS.ZIP
/
noss.cnf
< prev
next >
Wrap
Text File
|
1997-02-28
|
4KB
|
103 lines
<h1>Suppress server side includes and server side processing</h1>
Use this to suppress Server Side Includes (SSI) and Server Side
Processing (SSP). Server Side Includes are used to create
dynamic HTML documents by processing special keyphrases included in
an otherwise
standard HTML file. Server Side Processing occurs when the client
requests the services of a CGI-BIN script or an SRE-Filter add-on.
<FORM ACTION="/srefconf" METHOD="GET">
<input type="hidden" name="SET" value="no_ss">
Suppress server side includes (SSI) on HTML documents?
<menu>
<LI><INPUT TYPE=RADIO NAME="no_ssi" VALUE="1" $isyes ><STRONG>Yes</STRONG>:
SSIs will <b>not</b> be attempted <em>(they will be <B>suppressed</B></em>).
<LI><INPUT TYPE=RADIO NAME="no_ssi" VALUE="0" $isno ><STRONG>NO</STRONG>:
SSIs <b>will</b> be attempted.</menu>
</menu>
<br>
Suppress server side processing (SSP)?
<menu>
<LI><INPUT TYPE=RADIO NAME="no_ssp" VALUE="1" $no_ssp_yes ><STRONG>Suppress ALL</STRONG>:
Suppress all SSP requests.
<li><INPUT TYPE=RADIO NAME="no_ssp" VALUE="11" $no_ssp_int ><STRONG>Suppress Executable Keyphrases:</STRONG>:
Suppress executable keyphrases, but allow CGI-BIN and SRE-Filter
add-on processing.
<LI><INPUT TYPE=RADIO NAME="no_ssp" VALUE="0" $no_ssp_no ><STRONG>NO</STRONG>:
Do <b>not</b> suppress server side processing.
</menu>
<INPUT TYPE="submit" VALUE="Update this Parameter">
</FORM>
$cancel
<hr>
<h2> Notes </h2>
Although the use of <em>Server Side Includes</em> (SSIs) provide a convenient mechanism
for creating <em>dynamic</em> documents, you may wish to limit their availability.
In particular, processing of SSIs will impact system response time. Hence
if you <b>never</b> plan on using SSIs, it's a good idea to tell SRE-Filter
not to bother checking for them!
<P>
<EM>Server Side Processing</EM> (SSPs) can greatly extend the
capabilties of your web site.
In particular, some form of SSP is involved whenever an HTML <FORM>is
used. Unfortunately, the improper use of SSP can cause big security problems, especially if
you allow users to post their own programs.
<h3> Suppressing Executable Keyphrases </h3>
The <b>Suppress executable keyphrases</b> option is a less stringent version of SSP suppression.
-- it only applies
to the SELECT and INTERPRET CODE "server side include" keyphrases.
<blockquote><em>
CGI-BIN scripts, INTERPRET FILE keyphrases, and SRE-Filter add-ons
<b>will</b> be processed </em>
</blockquote>
The idea is that users of your site will not be able to cause trouble
by including ill-mannered code into their HTML documents.
<BR> In other words:
<ol><LI> If site administrators do <b>not want to review</b> HTML documents
posted on their site (say, by students)
<LI>Site adminstrators <STRONG>will review</STRONG> CGI-BIN scripts, etc. that users
wish to place on the server.
<LI>Site administrators <b>do</b> want to grant SSP and SSI to users.
<P>
</ol>
<STRONG>Then</STRONG>, a reasonable level of security,
without too harshly limiting
flexibility, can be achieved by using the enabling the
<STRONG>suppress executable keyphrases</STRONG> option.
</ol>
<BR>
<h3>More Notes ...</h3>
<ul>
<LI>Examples of <EM>Server Side Processing</EM> include execution of CGI-Bin scripts,
and execution of SRE-Filter add-on (such as the DOSEARCH text-file search engine,
or the BBS bulletin board system). In addition, SSPs can be invoked using
several SSI keyphrases; such as <!-- INTERPRET FILE -->
and <!-- #Exec cmd= -->.
<LI>When you suppress server side processing, requests
for server side processing will cause
a <TT>401 Unauthorized</TT> message to be returned to the client.
<LI> A less stringent alternative to suppression of server side includes
is to use the <A HREF="/srefconf?show=ssi_shtml_only"> Server side includes on <EM>SHTML</EM> files only</A>
option.
<LI>You can use the
<A HREF="/config2.htm#accessfile">Modify SEL-Specific Access Control</A> option (in the
intermediate configurator) to suppress server side processing and server side includes
on a SEL-specific basis.
</ul>