Home

iTools 9 User Manual

image

Contents

1. 94 CHAPTER 17 WEB SETTINGS Tenon s iTools s initial DEFAULT virtual host settings contain several Aliases used by the iTools Administration Server the iTools documentation and in the examples The default cgi bin ScriptAlias is also specified in this table To create a new alias enter the component of the URL to be aliased into the URL Path field of the Alias Settings table and enter the path to the directory or file containing the aliased data in the Directory or File eld If the URL Path or the target represents a directory it should begin and end with a If it represents a file it should not end with a If the aliased directory contains CGI scripts check the ScriptAlias checkbox Click Save to save these settings The specified target may reside anywhere within the server s directory hi erarchy it does not necessarily have to reside in the DocumentRoot directory for the virtual host servicing the request In fact by using an alias files in any directory may be accessed by a web browser without the client knowing where the files really reside 17 1 18 Error Files There is a link at the top of each page containing the Virtual Host Configuration table that allows you access the Error Files settings These settings specify the file to be returned to the client when a Web server error occurs When such an error occurs the originally requested page is not returned to the client instead the corresponding error file
2. Access Any Valid Users Any user from the entire list of users is permitted access with the proper password Selected Users Any highlighted user in the Users list is permitted access with the proper password Details on setting up users can be found in Chapter 13 Users amp Groups User in a Group Any user who is a member of any highlighted group in the Groups list is permitted access with the proper password Next pick a realm name and enter it in the Realm Name field This is strictly a designation for the collection of users or groups that are allowed access to the folder or file The name itself isn t significant The realm name is displayed in the web browser dialog box when user authentication is requested 17 3 ACCESS CONTROLS Browsers cache the realm name and username password combination and will send authentication information with the next request to the same realm This is nice for users since it means they don t have to re enter the information for every page accessed within a protected section of a website However the only way to clear the information is to go to an authenticated page with different username and password or to quit the browser This means that a different scheme is needed if sensitive material were being accessed by browsers shared by more than one person public libraries schools etc 17 3 9 Domain Name Based Restrictions Domain name restrictions can use either domain names
3. Click on the Create New Folder link Enter the name of the new folder in the available text field of the File Manager Press Enter and your system will create the specified folder 51 52 CHAPTER 8 FILE MANAGER 8 2 Uploading files in File Manager Using the File Manager Navigate to the folder where you want to upload your files Click on the Choose File button Search for and double click on the file to upload Click on the Send button to upload the file when you have finished selecting the file The contents of the folder is displayed in the main area including your uploaded files 8 3 Changing file folder permissions All files on UNIX including Linux and other UNIX variants machines have access permissions These tell the operating system how to deal with requests to access these files There are three types of access Read Denoted as r files with read access can be displayed to the user Write Denoted as w files with write access can be modified by the user Execute Denoted as x files with execute access can be executed as pro grams by the user Access types are set for three types of user group Owner Flags The owner of the file Group Flags Other files which are in the same folder or group Others Flags Everyone else The web server needs to be able to read your web pages in order to be able to display them in a browser The following permissions need to be set in order for your web site to functi
4. The Advanced Settings table contains some options that control the inner workings of the web server Your choice for these settings may be influenced by certain conditions such as how much memory the Tools system has the expected rate of hits the size of the average transfer the number of simulta neous transfers and the access bandwidth of the web server or the clients Virtual Hosts Access Controls MIME Settings Cache Settings Proxy Settings Advanced Settings Melp Runtime Settings Modules Config Edkor Runtime Settings Dvrective eee Web Server Type Apache 2 0 Stat Servers Max Cliente Max Spare Thresdr Min Soere Threads Threeds Per Child Max Requests Per Child 10 Mo Lirrvt Timeout Keep Aive Mas Heep Alive Requests Keep Alive Timeout Hostname Lookups Use Carnoarical Mame Server Signeture Click the lock to restrict access 17 7 1 Web Server Type The Web Server Type setting controls what version of the Apache Webserver are started on the Mac OS X system 17 7 2 Start Servers The Start Servers setting controls how many web server processes are created when the server is initially started The number of web server processes may be dynamically changed depending on the server s load so changing this setting has minimal effect once the server is up and has serviced its first few requests 17 7 ADVANCED SETTINGS 127 17 7 3 Max Clients The Max Clients setting control
5. View lines to 10 lew 23 Dec 200 3 17 40 56 00091 3 9 0 Ueera johal weblic 220 23 Hee 2003109150109 0900 127 0 0 5 Users aric hosteontig 226 2 Dec 2003 17 52 13 0009 y 9 0 Vaera jotal hostconfig 50 43 Doe 20031 17152116 0000 127 0 0 aars joraJ hosteontig 250 23 Doc0 20031117152 120 00091 0 Qeere jomal hosetoontig 726 23 Dec 2003 09 52 46 0000 127 0 0 Ueera eric Bestcontig 550 31 bo00 7001109152141 0809 1 0 Qeeres eric hesetoonftig 226 23 Dec Z2003 09 54 07 04049 127 0 0 Uaera jotal hostconfig 350 1 D00 2001109154111 909309 127 Oeere johal hostoonftig 150 13 Do0c 2003 109 54 14 0409 1 127 0 0 Vaeras jotal hostcontig 224 Fido size 27 1186 76 CHAPTER 14 SYSTEM STATUS 15 System Update Periodically Tenon releases updates to iTools Using the System Update feature you will be able to get Tools updates immediately Click the checkbox to select the roftesre that you wart to instal Tools Y Updeote _ PHS Update 5 0 for iTools 8 MySQL 4 0 16 for Tools Y Tomcat 5 0 10 for Tools 0 require hand edit of web xml if you had an older version installed MeDig 21 16 for Tools install amp Click the lock to restrict access If you don t see an update this means your system is up to date with the most recent iTools packages If your computer is on a network and System Update is reporting Not Found the network may
6. gt File Manager This user was given access to his own Log Reports Clicking on the Log Reports icon will only display the Logs from his virtual host As a default the user is also given access to File Manager which will allow upload access only to his virtual host Main Menu File Manager Help File Manager Path Library Tenon WebServer WebSites your client somedomain comf Y Filename Size Owner Group Owner Flags Group Flags Other Flags Last Modified Date Upload Fl If access to a virtual host was granted to the user then they will only see the virtual hosts that they have access to edit when they click on web settings CHAPTER 16 USERS amp GROUPS If the user tries to access something that they do not have permission to access such as network settings for a network interface that they were not assigned access to then they will be shown an error informing them that they do not have enough privileges NOTE Only the user named admin has the ability to create sub administrators 17 Web Settings 17 1 Virtual Host Apache provides the capability to support multiple servers on a single ma chine Each server is differentiated by a unique host name This feature is called virtual hosting For example it is often desirable for companies shar ing a web server to have their own domains with web servers accessible as http www company1 com and http www company2 com without requiring the user to know
7. 17 2 5 4 Self signed Certificates If iTools is on an intranet and is not visible to the Internet at large it can take advantage of SSL without having their certificate signed by a CA Certificate Authority such as Thawte Create your certificate as described earlier in this chapter That will yield a certificate signed by iTools While this is not a certificate signed by a CA it will allow SSL encrypted transactions from your iTools server Some browsers will complain that the certificate is not signed by a valid authority CA but certificates for only internal or intranet use do not need to be validated by any CA 172 99 107 17 2 5 6 Common Problems 17 2 5 6 1 Line Feed Problem Traditionally Unix and Windows PC differ in the format in which they store text files Windows PC places a carriage return character at the end of each line of a text file but Unix uses a line feed character Some Unix applications won t recognize the carriage returns added by Windows and will display a file as a single line interspersed with Ctrl m characters This appears on the screen as M Similarly some Windows applications need to see carriage return characters at the ends of lines and may treat Unix format files as one long line Certificates could potentially have M characters in them when certificate is received from Certificate Authority The easiest way to remove AM characters from the certificate file is to run tr from the Terminal Fo
8. Advanced Settings Help Configuration A ases Error Fles Logging Redirects URL Rewriting Virtus Mort Configuration Mb pour COM sin corn mac your domain com Port Ta Eat Certificate Library Tenon WebdServer wWwebSftes mac your domein cor berver Aliases Server Path Directory Index Hostname Loobups SSL Certificate File SSL Certificate Key File _ Delete Vetus Host mat pos domain com Check the lod to restrict acces 17 1 6 Server Name The Server Name entry displays the name of the virtual host to which the following settings apply It is the same name that was entered in the new Virtual Hosts Table It also includes the IP address and TCP port for this host The Server Name setting corresponds to the host name of this server It is only used in redirection URLs Internal redirects can happen if a URL request representing a directory lacks the trailing Redirects may also occur after CGI processing 90 CHAPTER 17 WEB SETTINGS If the Server Name setting is not set for a virtual host a reverse DNS lookup of the server s IP address is used This reverse DNS lookup may not return the desired host name 17 1 7 SSL Security An SSL security package is installed with the core Tools package SSL is disabled for each virtual host by default Once a Server Certificate has been generated SSL may be enabled by setting SSL Security to On 17 1 8 Document Root Document Root cont
9. Each domain can have an SPF record Enter the domain name in the SPF Name field and the text generated by the SPF wizard in the SPF Text field 6 5 22 Reverse DNS Records PTR Records This type of record is also known as a pointer or in addr arpa record Selecting the Reverse Zone link from the Primary Zone page displays the Host List sorted numerically by IP address This is the reverse lookup table allowing the DNS Server to reference a Host Name when queried with an IP 40 CHAPTER 6 DNS address Changes to the Reverse Zone are not automatically updated in the Primary Zone table because a single Reverse Lookup Zone may serve multiple primary zones sharing the same network number It is important to realize that reverse records on your server may not be authoritative for your server s IP number Here is a simple explanation of why e There are a finite number of IP addresses e Different major ISPs or organizations own blocks of these IP numbers e The ISPs are authoritative for the reverse record lookups of those IP numbers because they own them e Customers of ISPs are renting one or more IP numbers from the ISP which may retain reverse authority for those IP numbers For example a server with a DSL connection through a local phone company might have a static IP address Even if it is running a DNS server and that server is configured with PTR records it won t matter because the phone company will
10. In order to obtain a server certificate a Certificate Signing Request CSR must be sent to the Certificate Authority along with other proof of identity documents Click on the Certificate button in the appropriate virtual host and fill out the SSL Settings form within the Tools Administration Server Submit the completed CSR to the Certificate Authority There are many Certificate Authorities worldwide Copy and paste the CSR that is generated into the CSR online submission form Some browsers do a poor job of copying the CSR from the SSL CSR File form To test this copy the CSR and paste it into any empty text document of a text editor such as BBEdit If each line of the text is not left justified at the beginning of the line use the text editor to cut any white space at the beginning of each line Then copy this properly justified CSR and paste it into the CSR submission form Other documents validating the identity of the server must be mailed to the CA along with a service fee These documents include e Proof of the right to use the organization name as in a copy of the company articles of incorporation doing business as registration etc e Proof of domain name registration except for com e A letter printed on organization letterhead and signed by an authorized representative requesting certification of the domain name Your official certificate will be digitally signed and emailed to you by the CA Rename
11. Tools 9 User Manual Tenon Intersystems 232 Anacapa Street Santa Barbara CA 93101 805 963 6983 info tenon com February 19 2009 Contents T Antroducuonto OO Said 8 1 1 Serious Tools For The Internet 8 2 ostaline VENOMS TOO insna e E iii 9 2 SEM REGUE MONS cei E OE E 9 A2 PECON CU Bed Ot sapo 9 2 3 Network Control Paneline dt Leds 9 24 Instaline TTo Geaa T T 10 24 L New Installation usina 10 2 4 2 Upgrades or transition installs from earlier versions 10 2 5 Installing From A DOWnO dd esaicetnidsidsra lacada na 11 De WV Wat Gets Install td 11 2 7 Connecting to the Administration Server ooiocconninnononcnnrsnscnrnnrocnanerraroness 11 SECOS OTIS sica 15 De DN ii 16 A AdU S sar sac OE a senate as asied N N E E 17 A aout E EE 18 A TOO AMC MIMISH At OM OE Vie i aeaa A 20 4 1 Connecting to the Administration ServVeT ooocicncinnnnnnnnonnnnninnnnnnnnnanacnnnanass 20 42 Adium SELLA OM DELY CE ZA CCOSS uasna a a n a 20 4 3 Navigating the Administration Pages occoccocicinncnnnnonnnnnnnonnnnnnnnnnonncnanacnananaos 21 439 1 Ty pes Of Intormati nPleld Srita de ici 21 42 EA A eeree Orne et tr eater eer er oe nee en Se eer 21 A NO ULI FEAE Seene tts ee E E E E 22 A A nae Aa 22 Aedo 22 4 5 System Wide Configuration at a Glance cconocnicnocancononicnnononnanannnnnincnnanncnnos 22 AL oystem Wide CONS Ural OM dalla 22 EI OOIS SNES eai A A TAA 23 B59 CLOT OW A A A NNO 24 PEDONS SiN 24 Loo ETP SOULS 6 AO O 24 4 DO License ON A
12. URL Rewriting Settings For testing tenon com URL path i e example RewriteCond Test String l e REMOTE_HOST _ REQUEST_URI Condition pattern i e host1 A css Flags Test case insensitive O OR Combine with next condition RewriteRule Y Pattern i e oldstuff htmis A css Substitution i e newstuff htm Library Tenon EMU calendar ui default public css 1 Flags Chained with next rule y Case Insensitive No URI Escaping of output Query String Append Force MIME Type i e application x httpd cg Set Environment variable l e var val URL path i e example 17 2 59L 101 path not on a NFS mounted device when you want to use a rewriting map program It is not required for other types of rewriting maps 17 1 21 4 RewriteMap Directive The RewriteMap directive defines a Rewriting Map which can be used inside rule substitution strings by the mapping functions to insert substitute fields through a key lookup The source of this lookup can be of various types 17 1 21 5 RewriteRule Directive The RewriteRule directive is the real rewriting The directive can occur more than once Each directive then defines one single rewriting rule The definition order of these rules is important because this order is used when applying the rules at run time RewriteRule oldstuff html newstu html Thus a request to xyz oldstuff html gets correctly rewritten to the physical file
13. by the administrator of the Tools system Anonymous FTP users cannot list or see the files in the incoming directory so other anonymous FTP users cannot get a file deposited by a different FTP user unless they know the exact name of that file An incoming directory is created by using the command makedir dirname to create the specified directory dirname and then the command chmod 733 dirname to set permissions on the directory which will not allow listing of the folder by anyone except the root user but will allow anyone to upload toit 7 2 2 User Pass The User Pass checkbox enables or disables password based FTP access When a user accesses the Tools system via an FTP user name and password the Tools server automatically places that user in the directory indicated by the FTP Home setting for that user Password based FTP users can read or write files into the directories to which they have access 7 2 3 Limit The Limit setting controls how many simultaneous sessions the Tools FTP server will permit for each class of FTP service Subsequent attempts to FTP into the server will be denied when this limit is reached A message is provided to the FTP client that the limit has been reached and that they should try again later 7 2 4 Logging The Logging checkbox controls whether or not FTP transfers are logged for each class of FTP service The Tools FTP server logs FTP transfers in the Library Tenon FTPServer Logs ftp
14. 17 5 3 6 Expiry Check The Expiry Check directive observes expiration date when seeking files 17 5 3 7 Minimum File Size The Minimum File Size directive sets the minimum size in bytes of a file to be cached 17 5 3 8 Maximum File Size The Maximum File Size directive sets the maximum size in bytes of a file to be cached 17 5 3 9 Garbage Collection Max Memory Usage Maximum kilobytes of memory used for garbage collection 17 5 4 Memory Cache 17 5 4 1 Cache Size The Cache Size directive sets the desired space usage of the cache in KBytes 1024 byte units If a new entry needs to be inserted in the cache and the size of the entry is greater than the remaining size older entries will be removed until the new entry can be cached 17 5 4 2 Maximum Object Count The Maximum Object Count directive sets the maximum number of objects to be cached If a new entry needs to be inserted in the cache and the maximum number of objects is reached an entry will be removed to allow the new entry be cached 17 5 4 3 Minimum Object Size The Minimum Object Size directive sets the minimum size in bytes of an object to be cached 17 5 4 3 Maximum Object Size The Maximum Object Size directive sets the maximum size in bytes of an object to be cached 17 6 Proxy Settings The Proxy Settings table contains some options that control the proxy ca pabilities of Apache For more information on Apache and proxy service see the on line Anac
15. 34 6 5 13 2 De letime a Hosen 35 65 13 35 Modityine a Lost RECO rica 35 6 5 18 4 Adding Load Balancing HOStS conccnicnocancnnonicnnanonnancinacancananacnnos 36 O Lo AMAS RECON AS id 36 00 11 TNS at PNAS tias 36 6 519 2 Delete an AMAS data 36 63 19 30 C Pane ne ANANAS cosa dal 37 6 520 Mail Exc hane ers a a E EN 37 6 5 20 1 Adding Changing Mail Exchange Records tess 37 6 5 20 2 Deleting Mail Exchange isoen E cada 38 oal Addn o an SLF Recordsen a ii 38 6 5 22 Reverse DNS Records PTR Records oooooccncnnoncccnonanccnonanananinannnanos 38 022 erie a IIR Records 39 6 5 22 2 Deleting A PUR Record s cscsntsaiinssutscoutsoassnseoassaspensdonensesiycewnsteeiieants 40 6 5229 Modityine APIR Record edena eaa ined ERNO 40 ODO CONdary LON br id E 40 60L NEw Seconda AOne tas 40 6 6 2 Modifying Secondary Zone Information sssesesseserseeersererersrrersrsereeses 41 6 06 02 Deleni a Secondary ZOMG hiss iii 41 6 6 4 Converting a Secondary Zone To a Primary Zone uu eee 41 6 7 DNS Database FCS iarere nar rina A SEE Deepsietsc ic 41 Io tii 44 Zl The Pile Transfer PrOtOCOLusivocinaidtin A E 44 LATE ENO Oy Races sce a once eestor sc aetcattesanadaeuuntais S 45 7 2 ANODYVINOUS sui 45 TD WISE O 46 TPA iret steht O A eae ante le 46 FZ Pe NOS AINE osinon nani EE E taiwan a tetaac T T AEE 46 ac A dontonaicuresstassie ves yeaaseunpadiontuonnaess 47 7 Da OTVET AUC OMI es a T A taekatomtageneeneeres 47 TDD OUT sv scereae pints toansceae T E N
16. 9 0 is a full featured high performance easy to use Apache web and caching proxy server Apache the most popular web server on the internet is being used today to server over ninety million web sites Tenon s iTools is the easiest to use Apache in the world on a platform known for its elegant user interface and of late for its power and strength Welcome to a new era in Macintosh web service Tenon s iTools fast reliable secure Serious tools for the Intenet 2 Installing Tenon s iTools 2 1 System Requirements iTools will run on any Mac OS X or Mac OS X Server capable computer iTools requires Mac OS X 10 4 or above at least 256MB RAM at least 200MB of available disk space 2 2 Pre configuration iTools family of Mac OS X networking applications requires a properly set up network configuration Each Mac OS X system must be pre configured using the Network preference panel from System Preferences Having a valid hostname eg host domain com and IP address is a good beginning for iTools because the iTools configuration will automatically pickup this information If you are unfamiliar with these terms please contact your system administrator 2 3 Network Control Panel Application gt System Preferences gt Network gt TCP IP tab In most cases the correct settings in the Network Preferences will be Lo cation Automatic Show Built in Ethernet And in the TCP IP panel Configure Manually 10 CHAPTER
17. 99 17 22 SOI VE Or E nnna a a AA 99 1 20 Obtaining A Server Certificate it a e 100 17 2 Ae Dol DOCS E E E E A E E 101 724E Common Name ada 101 17 2 A 2 Oramia uon NaN Eei a 101 12 AS O reanizacional Unites u 101 1 AAC pidas 101 17245 State Or POV IN Ce is 102 7246 COMO nannan ION un aun emeunoneen gees 102 72A Emal Addis ran e saa hae tetera antes NEA 102 17249 Generando aca 102 PSAE a ar EEE E E E E E 103 17 2 5 1 Secure and Non secure Virtual Hosts cccocniccnconinacnnanonnannnnos 103 T7232 Using Multiple Cerificate sns a n 104 17 2 5 3 Safeguarding SSL Keys And Certificate 104 17 2 DA Se lt siened Cercate S isesi ieseeetegnreereabeeeieeies 104 17250 Common Proble ME enn a A dceoenionescenss 105 LAS ACCESS C ONIONS ar E ctenaeiniaetn Sica acne Pegttateuentace 105 15 1 Usme Access CONTO Sesa S 105 173 2 BEOWGING ONLENTS cigs scares copiosa 106 Ads ITC CLONIES esposa 107 YES E E N E E E N E EA EE naueliss 108 149 0 ACCESS COMO SEUS ind 108 TAO OPIO ass 108 TES WN BODA Van a T spe xeedeatuaes 109 17 3 7 1 Read Only Access for Anonymous USeTS cooconccncononicncononnaninnns 109 1738 Realm Based ResticuonS sacar 109 17 3 9 Domain Name Based RestrictiONS conconocnnonnonaninnonaninnnnanincnnaninonnons 111 17010 MIME Type Ove ride Smar na d 112 13511 Action Handler Overrides oeni istisini a datracele 112 15 12 Al0wOphons Override ain lis 113 IZAMIME rot ona elo 113 TALA CONS lolo 113 E ha A ter eran E eT Co etn renn
18. E E NE E 47 719 PASS FOER INE Oa A AA 47 OA EOS AMC OU salis 47 OO VANS AA a a T aah icat 47 TOCNO Iranier TimeOut sii aiads 48 3 7 Stalled Transfer Imc Uan taaan 48 7 9 0 Command BUGT OZE dalla 48 73 9 ALOW Root FIF Lol Mensano ds 48 7 3 10 Encrypted File Transfers FTP TLS SSL 48 oros Capa DI eS aore Ta E 49 pe Mana ara 50 SlCr anoto dial 50 8 2 Uploading tiles 1m Ele Mana Sr ada aias 51 8 3 Changing file folder permission cda 51 A A EE E N a 54 10 License FOr ALON croasser i edi 56 FMa Senio Siae S E dose auans 58 11 1 Sendmail Postfix Configuration 58 111 1 Local Host Names 58 1L LZ Relay DONATE ia 59 TELS V P LUIS vt 59 A E A a E es E NA 60 11 2 RostOftics Cons Ura OMe ri a ote oteuts 61 12 Trate MONO a a n a A 62 12 r Web Irale Montos 62 IZ FIP Trate MONO tiara 62 1235 Mall Trattic Montoto lisina alles 62 Ie Oe A O o on st tea oes tastes T 66 VS POOO Scr sacsasatsodecaacutssoncnuasttese scot aeea nace N dead 66 ED ZO OU E 67 TD 2 4 SOURCE Se DCS CMA ON 56 ie da 67 eE ET alls cere A et re E eee eee ere ere rere eT 67 14 stem tarta 68 PE Monitoring Der ver otatUs li 68 TELI Launch on Reboot sn 69 LAN ici e a la A oe T 69 o UO SOL VICE A e ou daesey ea veabynanbastassoentess 69 ALO INC DOL Si 70 ZTN PEO Reportar E asa 70 142 2 Mall Los Repo Menine e E A E T am endees 71 W29 EP LO IRE DOLE iaa 72 WAZ ARAWo Web Oti 73 429 Raw PIE LO Saca d 74 LD DV SECT Updated 76 LO Users E GL OU Ss di 78 64 1iTob1s Users
19. First 01 Aug 2004 00 09 Last 12 Aug 2004 10 04 81 57 MB Mails successfully sent 5 17 KEmats Mails failed refused o Jan 2004 62791 221 13 MB Feb 2004 58914 444 77 UB Mar 2004 69065 357 74 MB Apr 2004 68747 363 50 MB Mail Log report works with log files from sendmail Postfix and Post Office 14 2 3 FTP Log Report FTP Log Report reports the summary of all the FTP transfer activities on the server 74 CHAPTER 14 SYSTEM STATUS Main Mer Server Status Log Reports Statistics of FTP 13 Aug 2004 13 31 Aug 9 Usdale row 2004 3 fox Summary Days olmon Days ol weet Hours Counties Full list Hosts Ful bet Lastwiet Unrescived IP Address Aulher calod users Full st Lasl vent Robots Spiders visitors Full list Lasi vist Visits duraton Files type Viewed Full list Entry Exit Summary Last visit 13 Aug 2004 20 21 99 329 MB 2 35 hiset 1299 14 Kisi Jan Feb Mar Apr May Jun Ja Aug Sep Oct Now Dec 2004 2004 2004 2004 2004 2004 2004 2004 2004 2004 2004 2004 105 119 467 a a3 161 a3 57 196 ot a2 wi Summary Marth Aug 7904 36 42 1 16 vewte visitor Mont 269 93 MB 113 06 MB 104 31 MB 191 98 MB 14 2 4 Raw Web Logs The Raw Web Logs pull down menu contains a list of the web log file from Library Tenon WebServer Logs This function will display the entire log file therefore you need to be careful about using this feature with large log files Main Menu Help I
20. Menu Server Status Log Reports Statistics of Last Update 13 Aug 2004 13 30 ag 5 2004 3 fox Summary Days ol month Days ol week Hours Counties Full bst Hosts Full list Last visit Unresolved P Address RobotSpiders visitors Full list Last visit Visits duration Files type Viewed Ful list Entry Ext Operateg Systems Versions Unknown Browsers Versions Unknown Origin Retering search engines Refering stes Search Search Keyphrases Search Keywords Miscellanous HTTP Status codes Pages not found Summary Summary Last visit 01 Aug 2004 00 01 Month Aug 2004 13 Avg 2004 1330 19323 23738 98391 324870 28 91 G8 122 vistts visttor 4 14 pages vist 13 68 hits vesit 1277 18 KBvise odididal lides Jan Feb Mar May Jun Jul Aug Sip Oct Now Dec 2000 2008 2004 2004 2004 3006 2000 2006 2006 2004 2004 2094 e e a 16775 21952 395079 81 99 GB 18284 23813 sate 394582 84 40 GB 21408 28028 116854 476050 96 64 GB 19126 26743 114135 424628 74 99 GB 14 2 2 Mail Log Report Mail Log Report reports the summary of all the Mail SMTP activities on the server 14 2 LOG REPORTS 73 Main Menu Server Status Log Viewer Log Reports Heip Statistics for Mail Last Update 12 Aug 2004 10 15 Update now Reported pertod Aug 2004 fox Monthly history Days of month Days of week Hours Hosts Full lst Last Unresolved IP Address Sender EMall Full sx Last Receiver EMail Fud list Last SMTP Esror codes Summary Month Aug 2004
21. Node Select the Save button to submit the new Host Name information The new information will be updated in the Reverse Zone s records and will be presented in the Zone Table for this Zone 6 6 SECONDARY ZONES 41 6 5 22 2 Deleting A PTR Record To delete a PTR record from the DNS Settings page select the zone con taining the PTR record you wish to delete From the Reverse Zone page empty the IP Node field for the unwanted PTR record Click the Save button to see the changes 6 5 22 3 Modifying a PTR Record If a host record needs to be changed click on the zone name in the Zone page and modify as desired The page is the same one asis displayed for creating a new Zone Click Save when you have finished 6 6 Secondary Zones Main Menu Primary Zone Secondary Zone Reverse Zone Help T one Name New Zone tenon com tenon com IP Address for the Master Servers 68 167 235 91 A Secondary Zone is a Zone that a Domain Name Server loads from another Domain Name Server called a Master Server Secondary Zones are always redundant copies of existing Zones on other systems 6 6 1 New Secondary Zone The New Secondary Zone Page is accessed by selecting the New Zone entry from the Secondary Zone Settings page This page is used to enter the Domain Name of a new Secondary Zone to be managed by this system Enter the Domain Name for the Secondary Zone The Domain Name must match the Domain Name for an existing
22. The log file is a text file containing space delimited entries for every request to the server with data in the order the tokens are set in the log format If the information is not available for a particular log token the log will include in the place of the missing information If the Custom Log is not customized for a particular virtual host the Log Format setting will be inherited from the DEFAULT virtual host This results in the default access log itself being inherited and utilizing the DEFAULT virtual host LogFormat The characteristics of the request itself are logged by placing directives in the format string which are replaced in the log file by the values as follows Format Description String The percent sign Remote IP address Local IP address Toa PA eB Bytes sent excluding HTTP headers Bytes sent excluding HTTP headers In CLF format i e a rather than a 0 when no bytes are sent Foobar C The contents of cookie Foobar in the request sent to the server af Filename Remote Host 1 Remote logname from identd if supplied m The request method Pap PP poe The query string prepended with a if a query string exists otherwise an empty string Jo Firstlineofrequest OSS O Status For requests that got internally redirected this is the status of the original request gt s for the last Time in common log format time format standard English fo
23. Tools service file or directory based on groups of users each user with their own password Main Menu Users Settings Groups Settings Help New Croup Name iToolsAdmin myGroug 16 3 1 Creating a Group To enter a new group from the Admin Home Page click the Group Settings button to move to the Group page Type the group name into the empty 16 4 TOOLS SUB ADMINISTRATION 83 text edit field in the first row of the table Click the Save button to submit the new group Once a group has been entered the new entry will show up in alphabetical order in the Groups table 16 3 2 Users in Group To select which users are to be members of a group click on any group in the Group List column The Users in the group will be selected from the Users table To select users for inclusion in a group click on each username within the scrollable list of all users To select multiple users hold the lt shift gt key and click to select a series of users or hold the lt Apple gt key lt control gt key on non Macs to individually select any combination of users When a user is selected for inclusion in the group the user s name will be highlighted Click on Apply to submit the selected users 16 3 3 Modifying a Group Name To change an existing group name modify the text of the Name field and click Save to submit the change 16 3 4 The Tools Admin Group The iTools Administration Server uses a special group named iToolsAd
24. Zone on another DNS server Enter one or more IP Addresses in the Internet dot notation for example 205 1 2 66 for the Master Servers Primary DNS Servers of the Zone The list may include a single IP Address or multiple IP Addresses up to ten Multiple IP Addresses can increase the availability of a Zone s database In cases where a Master Server has several IP addresses by which it may be contacted or when multiple Master Servers exist for a given Zone multiple IP Addresses should be used The order in which the IP Addresses are entered is the order this Domain Name Server will use when attempting connections to 42 CHAPTER 6 DNS the master server s to verify and update its records for this secondary zone The Domain Name Server will cycle through the list until it successfully contacts a Master Server In the case where a Secondary Zone is being created simply to move a Zone from an existing Server a single IP Address is sufficient Enter the IP Address of the Master Server for the existing Domain Select the Save button to submit the New Secondary Zone information The new Secondary Zone name will now be included in alphabetical order in the table of Zones on the DNS Home Page 6 6 2 Modifying Secondary Zone Information The Secondary Zone Page is accessed by clicking Secondary Zone link from the navigation bar This Secondary Zone page presents a list of the IP Addresses of the Master Servers for this Secondary Zon
25. abc def newstuff html 17 2 SSL 17 2 1 Secure Socket Layer Tools supports version 3 0 of the Secure Socket Layer SSL protocol to encrypt web server transmissions The secure socket layer intercepts network calls from the server to encrypt the data before forwarding it to the network layer for transmission to the browser The web server and the browser negotiate an encryption algorithm or ci pher to be used for the session A session key is securely communicated to the browser using public key cryptography The session key is then used symmetrically i e to both encode and decode the actual session data The first step in setting up SSL is generating a Certificate Signing Request or CSR From the CSR a certificate can be produced by a Certificate Authority or CA 17 2 2 Server Certificate The server certificate validates the identity of the server Server certificates may be signed by a trusted higher authority the Certificate Authority or CA who assures the identity of the server In a typical commercial virtual host setup each IP based virtual host will have a unique server certificate Name based virtual hosts hosts that share an IP address must share the certificate of the common IP host By default iTools associates a certificate issued to an IP based virtual host with all configured name based virtual hosts that share that IP address 102 CHAPTER 17 WEB SETTINGS 17 2 3 Obtaining A Server Certificate
26. any extra path information Virtual hosts can have unique IP numbers called IP based virtual hosts or they can share an IP number and use host name information that is included in the header sent from browser to server in each request You can combine these styles of virtual hosting as well Early browser versions didn t support inclusion of host header information meaning that header based virtual hosting didn t work with those browsers but very few browsers in use today have this limitation Tools has a setting in the virtual host configuration to insure proper redirection for browsers lacking host header support 17 1 1 Virtual Host Table From the browser Administration home page click Virtual Hosts to access the Virtual Hosts Table This table lists alphabetically the virtual hosts configured on this server Initially this table will include a single virtual host which is the DEFAULT host and it is the global settings for virtual hosts 17 1 2 Default Virtual Host The DEFAULT virtual host settings apply to incoming requests for any virtual host if the corresponding setting is not explicitly set with alternative information in the Virtual Host Configuration table for that host 97 88 CHAPTER 17 WEB SETTINGS To set up a template for your new virtual hosts to inherit from you can go to Configuration for the DEFAULT Virtual Host and select Virtual Host Defaults from the menu Any settings that you set in this form wi
27. are encouraged to and typically do use this address to notify Web masters of any problems they are experiencing with a web server The email address should be an existing account on some email server 17 1 VIRTUAL HOST 91 In the case of a virtual host the Server Admin setting is inherited from the DEFAULT virtual host by default Many Web sites follow the convention of using an email address webmaster virtualhost It s generally a good idea for this address to be to a person who can x problems that arise with that host s web site or the server itself Be sure this field contains a valid email address 17 1 10 Server Alias The Server Alias denotes which alternate host names should also apply to this virtual host It is used with host header based virtual hosts The DEFAULT Virtual Host does not include a setting for Server Alias so if the Server Alias is not set no alternate host names will apply to this virtual host Note that you can change the DEFAULT Virtual Hosts entries and the new settings will be inherited by all Virtual Hosts on that server Adding the IP number for this host to the Server Alias field will ensure that requests made to the IP address will go to this host this defines a primary or default host for the server for this IP address Generally if users added the virtual host in question as your domain com they will list www your domain com in the Server Alias to ensure that users accessin
28. bit host number n1 n2 n3 a 192 lt n1 lt 223 The Internet address is usually provided by your network administrator or your Internet Service provider If you don t have an IP address you will have to contact them for an IP address available to use on your Tools server Netmask is a 32 bit bit mask which shows how an Internet address is to be divided into network subnet and host parts The netmask has ones in the bit positions in the 32 bit address which are to be used for the network and subnet parts and zeros for the host part The mask should contain at least the standard network portion as determined by the address s class and the subnet field should be contiguous with the network portion Contact your network administrator or Internet Service provider for the correct netmask to use with your IP address The stf interface supports 6to4 IPv6 in IPv4 encapsulation It can tunnel IPv6 traffic over IPv4 as specified in RFC 3056 IPv6 is a newer IP protocol specification RFC 2460 a next generation IP with expanded addressing capabilities 128 bits instead of 32 bits The gif interface is a generic tunneling pseudo device for IPv4 and IPv6 It can tunnel IPv 46 traffic over IPv 46 Therefore there can be four possible configurations The behavior of gif is mainly based on RFC2893 IPv over IPv4 configured tunnel Both stf six to four tunnel interface and gif generic tunnel interface net work settings today wi
29. gt Expire e Retry 15 minutes Time To Live 1 day gt Authortative Name Server Hostmaster Domain or Subdomain Hostname Domain or Subdomain Priority IP Address or Alias 6 5 2 Domain Name Enter the Zone Name of the Primary Zone For example new zone here com 6 5 3 Refresh Retry Expire And TTL Values These Start of Authority values govern how often other Domain Name Servers check with this server to ensure that their information is up to date The Refresh Retry and Expire values are only used by other DNS servers if they are acting as Secondary Servers for this Zone Choosing the time values is about determining the right balance between how rapidly data is updated versus how much load is placed on the DNS server These values can be changed later by modifying the Start Of Authority table For details on making these changes and for definitions of the Start Of 32 CHAPTER 6 DNS Authority values please see section Start of Authority on page 33 6 5 4 Authoritative Name Server and Hostmaster Values The authoritative Name Server value should contain the name of the server that is the best source for the data contained within the zone This field usually corresponds to a Name Server host that was registered when you bought your domain The name should usually be a host name that resolves to the IP address of your iTools server For this field be sure t
30. idea to be near the console when doing this If you cannot be near the console use sudo ipfw flush to flush the firewall via SSH access e Don t forget the loopback interface 14 System Status 14 1 Monitoring Server Status The System Status provides some useful information about the current state and version numbers of the various Tools services The buttons on the System Status page provide a means for the Tools administrator to examine and control certain aspects of the server The System Status page first checks on the current state of the various services If a particular service is active the status column shows green light and its version number is displayed in the rightmost column of the table otherwise a red light appears in the status column and unavailable appears in the Info column 69 70 CHAPTER 14 SYSTEM STATUS Main Menu System Status Log Viewer Log Reports Help 192 168 1 7 Service Status Launch on reboot Info DNS Server Enabled on startup Restart Service Stop Service BIND 9 5 0 P1 FTP Server Enabled on startup Restart Service Stop Service 220 ProFTPD 1 3 1rc2 Server ready Enabled on startup post office v3 8 4 release 116 ID Mail Server Q Restart Service Stop Service 1001 51241U5L25100V38 Apache 2 2 9 Tools 9 0 2 Mac OS X Web Server Enabled on startup Restart Service Stop Service mod_ssi 2 2 9 OpenSSL 0 9 7 DAV 2 PHP 5 2 6 Uptime 342998 Threads 1 Questions
31. is returned Virtual Hosts Access Controls MIME Settings Cache Settings Proxy Settings Advanced Settings Help Configuration A ases Error Fies Logging Redirects URL Rewriting Error Documart Settings Por mec yor dorar com 404 Not Found 400 Bad Request To associate an error file to a specific error select the error code from the pop up list and type the path to the error file into the text field Then click the Save button Remember that the path is a full path from the root of your server To change an error code for an existing error file or to change the name of an error file change the selection in the pop up list or modify the error file name in an existing text edit field Then click Save to submit the change The two most common errors 403 Access to the requested page is denied and 404 The requested page does not exist are usually mapped to files with simple messages explaining those errors However any of the error cases from the most common to the most obscure can be mapped to any URL including a CGI for advanced error logging and reporting 17 1 VIRTUAL HOST 95 17 1 19 Logging The Logging link in the Virtual Host Configuration will display the logging location settings for your virtual host Main Menu Virtual Hosts Access Controls MIME Settings Cache Settings Proxy Settings Advanced Settings Help Configuration Aliases Error Files Logging Redirects UR
32. log file The contents of this file 48 CHAPTER 7 FTP can be viewed by clicking on the FTP Log button in System Status under sub menu Log Report 7 3 Advanced FTP Settings 7 3 1 Server Admin The Server Admin directive sets the email address of the administrator for the server 7 3 2 Port The Port directive configures the TCP port which proftpd will listen on 7 3 3 Passive Port Range Passive Ports restricts the range of ports from which the server will select the PASV command from a client The server will randomly choose a number from within the specified range until an open port is found Should no open ports be found within the given range the server will default to a normal kernel assigned port and a message logged The port range selected must be in the non privileged range eg greater than equal to 1024 it is STRONGLY RECOMMENDED that the chosen range be large enough to handle many simultaneous passive connections for example 49152 65534 the IANA registered ephemeral port range 7 3 4 Login Timeout The Login Timeout directive configures the maximum number of seconds a client is allowed to spend authenticating The login timer is not reset when a client transmits data and is only removed once a client has transmitted an acceptable USER PASS command combination 7 3 5 Idle Timeout The Idle Timeout directive configures the maximum number of seconds that proftpd will allow clients to stay connected without recei
33. lower portions of the tables while user defined changes are displayed in the top portions of the tables Buttons are provided to save or reset any changes made to these forms to return to the main Tools Administration Server page or to move on to other tables related to the current table Each page has a menu item labeled help for quick access to a specific section in the documentation The following sections explain the conventions used for navigating the configuration settings and making changes to those settings 4 3 1 Types of Information Fields Information in the tables may be displayed in the following ways e Text edit fields e Radio buttons e Check boxes e Pop up lists 4 3 2 Making Changes To make changes to an item either re type its text change the radio button or check box settings or select a different item from a pop up list Then click the Save button If an entry in a table is not presented in a text edit field or as a radio button check box or pop up list that entry may not be changed Multiple changes per save are permitted In most cases once changes are saved the table is re displayed with the corresponding changes in place In some cases you are returned to a previous window Changed items may move to a different row in a table if the rows are sorted and the key used in the sort was one of the changed items 4 3 3 ADDING ENTRIES 23 4 3 3 Adding Entries New items are usually entered in the last ro
34. menm cethe so ext fiker _ module Library Tenon WebServern Modules mod_ext_filter ro indude_rrodule IUbsary Tarori WedServer Modules mod_indude so log cona module IUbrary Tanon WebServer Modes rod_log_corfig 10 log _forensk module Ubrany Tanon WebServer Moduler mod log _forenric ro ar_module JUbsary Teron WebServer Modules mod_env 10 mime_megit_module Ubrary Tenor WebServer Modules mod_mime_madgic ro corn meta module Hubsary Tenor WebServen Moduler mod_cern_meta cro pres_module Ute ary Tenor WebServer Modules mod_expires s0 headers _module fUbsrary Teron WebServer Modules mod_headers s uretra module IUberar Taron WebServer Modwer mod_vuserrack co uregue_ d_rmodule IJUbrary Tenor Webserver Modules iod unique id so retenvif_module Ubrary Tenon WebServer Modules mod_retenwit ro proxy_rnodule ubrar Tenon WebdServer Modwes mod_proxy so 17 8 CONFIG EDITOR 129 17 9 Config Editor There are certain complex directives that can be configured by hand coding in the configuration files Config Editor provides a list of Apache related configuration files and power users can add additional directives into the configuration file Any changes made to the files the web server will require a restart for those changes to become effective Main Menu Virtual Hosts Access Controls MIME Settings Cache Settings Proxy Settings Advanced Settings Help Runtime Settings Modules Config Editor Select A Conf
35. not be able to access the Internet or your computer may not be allowed to access Internet locations You can still download the latest Tools update packages explicitly from Tenon s web site When you select the package to update the system will push the system update to a background job You may want to check back later to make sure that the update has been completed After the update is completed it is highly recommended that you reboot the server to ensure that all the latest modules are initialized 77 78 CHAPTER 15 SYSTEM UPDATE 16 Users amp Groups 16 1 Tools Users vs System Users Users on your server can be empowered with different kinds of privileges which may include e Administration of the Mac OS X System settings e Access to the server with desktop and other displays for that specific user e Logging on over the network via telnet or ssh e FTP access to exchange files with the server e Access to electronic mail via the E mail server e Access to browse upload or publish web pages e Ability to administer a sub domain on your web server While a System user that has been added via the System Preferences may have all of these abilities Tools users are designed to be restricted to certain types of access thus reducing a server s exposure to a potentially dangerous user There are several classes of iTools users that offer subsets of the above capabilities iTools users are created in the Admin
36. servers are supposed to accept mail for those hosts names The Tools server can accept email for any domain name or host as long as the DNS is configured with the appropriate MX record See section Changing MX Records on page 38 for details on MX records 11 1 2 Relay Domains The Relay Domain Names table can be configured to include any domain names host names or IP addresses for which the mail server should relay mail to those destinations Any mail that is sent through the SMTP server which is not to be delivered to a local account is considered to be relayed Since relaying can be used to hide the identity of senders of unsolicited SPAM mail relaying is disabled in Tools by default In general clients should use their ISP s SMTP server for relaying mail If this is not possible or you are acting as the user s ISP the domain name Hostname or IP address of the client s machine may be entered in the Add Host field of the Relay Domain Names table Click on the Save button to save the added host Main Menu Local Host Names Relay Domains Virutal Users Mail Aliases Help Relay Domain Hames Mail domains to be relayed by this host Status Relay Domains enabled disabled v tenon com Click the lock to restrict accere 11 1 3 Virtual Users Virtual users should be configured in situations where fake e mail addresses are needed to deliver to real accounts If a mail account were alredy establis
37. step The last step of the install process Optimizing System Performance takes a few minutes so be patient Quit the installer when it has completed the process At this point it will ask you to reboot your computer then you will have full access to iTools Other packages e g PHP MySQL etc are separate downloads and are installed in a similar manner Always install PHP before installing MySQL 2 6 What Gets Installed Library Receipts Tools9 pkg Library Tenon gt assorted files including a modified httpd conf The original httpd conf is backed up during the install process Your web site s content will reside in folders and sub folders within the folder Library Tenon WebServer WebSites 2 7 Connecting to the Administration Server When you start up your Mac the servers set to be on by default are automatically launched and run as invisible background applications On the iTools machine you can use your web browser to connect to the iTools Admin server using localhost or 127 0 0 1 From other locations use the machines fully qualified host name or IP address For example https 127 0 0 1 85 for SSL enabled Admin server Or http 127 0 0 1 84 for non SSL Admin server 12 CHAPTER 2 INSTALLING TENON S TOOLS The secure admin server runs on port 85 and the non secure admin server on port 84 the URL will reflect that If you have a firewall and will be connecting from
38. the ZoneTable for this Zone 6 5 19 2 Deleting an Alias To delete an alias from the DNS Settings page select the zone containing the alias you wish to delete From the Zone page empty the Name field for the unwanted host record Click the Save button to see the changes 38 CHAPTER 6 DNS 6 5 19 3 Changing An Alias To change an alias record click on the name of the alias from the Primary Zone page The page that displays is the same page as for creating a new alias Modify the entries as desired then click Save 6 5 20 Mail Exchangers When you first create a Primary Zone one new Mail Exchanger record is created in the zone with a Hostname of mail you will need to add a new Host Name record with this name and the IP address of your mail server to get the Mail exchanger to work correctly To insure proper delivery of mail it is important to have at least one Mail Exchanger record for each primary zone Most administrators choose to have several if they have backup mail servers available The Mail Exchanger is usually added to the Host Name record that matches the Zone name but any individual hosts within the zone can have different mail servers if desired The precedence value in Mail Exchanger records determines which mail server preferentially gets the mail on the first attempt at delivery In most cases users will be collecting their mail from the primary mail server If the first primary mail server is unavailable when
39. the first one to filter a network packet is passed through the list of rules before the firewall decides to deny or accept the network packet Main Menu Network Settings Firewall Settings Help Rule Humber Policy Protocol Port Source Destination 192 168 1 1 192 168 1 4 f Delete Ma Save Click the lock to restrict access 13 2 1 Policy Allow Allow packets that match rule The search terminates Deny Discard packets that match this rule The search terminates 13 2 2 Protocols TCP or UDP protocol to filter 68 CHAPTER 13 NETWORK 13 2 3 Ports With the TCP and UDP protocols optional ports may be specified as Port A single port for example 80 is the HTTP port Port Port A range of ports for example 250 260 13 2 4 Source amp Destination Specifying any makes the rule match any IP number ipno An IP number of the form 1 2 3 4 Only this exact IP number will match the rule ipno bits An IP number with a mask width of the form 1 2 3 4 24 In this case all IP numbers from 1 2 3 0 to 1 2 3 255 will match ipno mask An IP number with a mask of the form 1 2 3 4 255 255 240 0 In this case all IP numbers from 1 2 0 0 to 1 2 15 255 will match 13 3 Checklist Here are some important points to consider when designing your rules e Remember that you filter both packets going in and out Most connections need packets going in both directions e Remember to test very carefully It is a good
40. the update validate process at the interval specified in the retry value This value should be significantly smaller than the refresh value A value of 1 3 to 1 5th of the refresh value is appropriate 6 5 9 Expire The Expire value indicates how long the secondary servers for this zone should preserve their data if the primary fails to respond to retries This value should not be too small if the primary DNS server is not responding for hours or days there is probably something seriously wrong and you will want the Secondary DNS servers to preserve the current data they have so that your DNS information will still be available until your Primary DNS server is back online One to two weeks are common settings for this 34 CHAPTER 6 DNS 6 5 10 Time to Live The Time To Live value is used by any other Domain Name Server that queries any piece of data within this Zone The Time To Live tells the other DNS Servers how long they may cache the data before checking back with this Server to see if the data has changed Unfortunately not all DNS servers are well behaved with regard to honoring TTL values It is appropriate to change the default time values when hosts domains are being transferred to a different server or when the IP numbers of various hosts are changing for some other reason such as moving to a different upstream ISP In this event you would want to shorten the time values for the Refresh and Time to Live fields 6 5 11 Au
41. the username and password may be recognized as a successful login the user s session is immediately terminated as if the user logged in and immediately logged out In addition when a user is designated as an FTP user login to the Mac OS X Server s FTP server causes the user s home directory to be set to the directory specified when the user was created in the Administration Server This means that the user s ability to move around a file system is strictly limited to the directory that he or she is logged into and the directories below If IMAP iPOP3 Module is installed iTools users with FTP access will also be granted access to send and receive mail using POP and IMAP servers System User Types Admin User has all the login capabilities N B The user admin has including email and FTP if those services special capabilities Do not delete are enabled and can administer system this user but do change the settings on the server password and do not give this Admin users are members of the iTools user FTP privileges This user is Admin group the supreme administrator of the iTools system and will have privileges that other users in the iTools Admin do not have Normal User has all the login capabilities including email and FTP if those services are enabled but cannot administer system cattinae an tha carvar CHAPTER 16 USERS amp GROUPS 81 16 2 Users The Users table contains all of
42. these values is not cached The default setting is to not cache URLs containing cgi bin or Other words or virtual host names may be added to this list to force other URLs to never be cached 17 5 3 Disk Cache 17 5 3 1 Cache Root The Cache Root directive defines the name of the directory on the disk to contain cache file If the disk cache module has been enabled this directive must be defined Failing to provide a value for Cache Root will result in a configugration file processing error The Cache Directory Levels and Cache Directory Length directives define the structure of the directories under the specified root directory 17 5 3 2 Cache Size The Cache Size directive sets the desired disk space usage of the cache in KBytes 1024 byte units This directive does not put a hard limit on the size of the cache The garbage collector will delete files until the usage is at or below the settings Please use a value that is lower than the available disk space 17 5 3 3 Garbage Collection Interval Garbage Collection Interval is the interval between garbage collections 17 5 3 4 Cache Directory Levels The Cache Directory Levels directive set the number of subdirectory levels in the cache Cache data will be saved this many directory levels below Cache Root 17 5 3 5 Cache Directory Length The Cache Directory Length directive sets the number of characters for each subdirectory in the cache 17 6 PROXY SETTINGS 121
43. 2 INSTALLING TENON S ITOOLS m aog Show All Displays Sound Network Startup Disk Location Automatic Show Built in Ethernet Jb TCP IP PPPoE AppleTalk Proxies Ethernet a Configure IPv4 Manually IP Address 192 168 1 100 Subnet Mask 255 255 255 0 Router 192 168 1 1 DNS Servers 12 7 0 0 1 Search Domains example com IPv6 Address Configure IPv6 Click the lock to prevent further changes Assist me 2 4 Installing iTools 2 4 1 New Installation Optional Apply Now After completing the system and network requirements as outlined above proceed with the install Chapter 3 is a Quick Start Guide 2 4 2 Upgrades or transition installs from earlier versions If you are doing an upgrade or transition it is a good policy to backup your exiting server iTools 9 will install gracefully over an Tools 8 2 installation For other transitions check the Tenon web site Support pages for white papers and hints 2 5 INSTALLING FROM A DOWNLOAD 11 2 5 Installing From A Download Tenon s Tools can be found at http www tenon com products itools osx Check Tenon s web site regularly for updates or subscribe to Tenon s Tools mailing list for automatic notification about updates and technical discussions about the software Double click the package installer You will need to authenticate yourself as an Admin user Proceed through the installation process step by
44. 5 1726 MocRequests Cer Child eo ele lol 125 AA A ita Wadins Siento aatercamediu esa eawinimantTie ee 125 177 9 Keep AVE tandas 126 1779 Max Keep Alve REGUECSIS eran dns 126 172710 Keep Alive meo tii 126 17 71 Hostname Lo0kU Deacon cosa 126 17 7 12 Canonical N anme monies n 126 17 713 Server SNAUT Ernon a 126 17 8 Apache Module Configuration sseessseseeseesesistsressrererisrerersrsreresrsresess 127 TTD GOWNS Potosi 128 Appendix A Apache Modules iii 130 Pol Environment Crea UON ai 130 A Content Type DECISIONS aiaa teat conaceciuneiuee 130 AU RE WIA DING SI AAN 130 AA Directory Handling src liales E 131 APACE COMO dedicadas 131 AIRES PONS laca 131 AD ame E Onen eaaa nserte err trimer eer opm er errr ee eres ne renner errr cr tenner 132 AS Internal Content Handlers cinsinin 132 AO a ap ianear ems nee 132 PV OMS COMA C OWS EE E E nadizsns ens EE A E E E 132 Ae r FE OGY P AON esaa nro 132 1 Introduction to iTools 1 1 Serious Tools For The Internet Tenon s iTools is a family of professional quality high performance configuration and management tools that makes managing internet services under Mac OS X and Mac OS X Server easy and secure Apple s Mac OS X operating system combined with the strength and ease of iTools makes the Macintosh a world class platform for web content delivery On Mac OS X client iTools turns the desktop Mac or Mac mini into a powerful yet inexpensive webserver With Mac OS X Server on an Xserve bo
45. Cache Settings Proxy Settings Advanced Settings Help General Settings Proxy Access Remote Proxies Proxy Accers Settings Domain Based Restrictions _ Aloy Then Deny Unspecdtied Are Denied Recommended Deny Then Allow Unspecfed Are Allowed Derry List Allow List 17 6 13 Domain Name Based Restrictions The Domain Name Restrictions control which hosts may use this Tools server as a proxy server These restrictions are applied the same way as Tools domain name restrictions are applied to any file or directory See section Do main Name Based Restrictions on page 84 for more information 17 6 14 Proxy Block The Proxy Block directive specifies a list of words hosts and or domains separated by spaces HTTP HTTPS and FTP document requests to matched words hosts or domains are blocked by the proxy server The proxy module will also attempt to determine IP addresses of list items which may be host names during startup and cache them for match test as well For example if the ProxyBlock table contained nudes games some host com Access to any URL containing the words nudes or games and to some host com would be restricted some host com would also be matched if referenced by IP address Note that referencing some host would also be suficient to match 126 CHAPTER 17 WEB SETTINGS some host com Note also that the wild card blocks connections to all sites 17 7 Advanced Settings
46. Domain Name your domain com Authoritative Name Server ns1 your domain com Hostmaster dnsmaster your domain com Click Save to save the zone 3 2 IP Address Once DNS is configured it s time to setup IP address for your hosts If you have only one IP address or have already added all of your addresses in Apple s Network preferences you can skip this section Click on the Network Settings icon and a screen will be displayed similar to this Main Menu Network Settings Firewall Settings Help lod Interface Name end giro IP Address Hatrnash sto end 192 168 1 105 255 255 255 enl fwo Save Chick the lock to restrict access E Co E E UC V C U W asu da V c DU NETW OTE ALC simply add the IP addresses that you wish to host on the appropriate interface If you are unsure about this section please contact your system administrator Click Apply to save the settings 3 3 VIRTUAL HOSTS 19 3 3 Virtual Hosts The virtual host concept is a way to host more than one website on a particular machine Each website has its own hostname e g www whatever com without requiring the user to know any other pathname and is referred in Apache terminology as a virtual host VH Once DNS and IP address are correctly set up it s a simple matter to add virtual hosts Main Menu Virtual Hosts Access Controls MIME Settings Cache Settings Proxy Settings Advanced Settings Help Virtual Host
47. For more information see Chapter 10 License Information 4 5 7 Mail Settings iTools itself does not include a mail server However it reflects the status of whatever mail server is running on the system The Mail Settings section supports very minimal configuration for Apple s as delivered mail server sendmail or Postfix Alternately you can install Tenon s Post Office and the Mail Settings icon will take you to the Post Office web based administration page For more information see Chapter 11 Mail Settings 4 5 8 Network Settings The Network Settings section contains configuration parameters for IP ad dress and Firewall settings For more information see Chapter 13 Network Settings 4 5 9 System Status The System Status section provides a quick look at the status of all of the servers included in iTools These servers can be turned off and on here as well For details see Chapter 14 System Status 4 5 10 System Update This section is used to keep Tenon s iTools up to date with the latest security 26 CHAPTER 4 ITOOLS ADMINISTRATION SERVER 4 5 11 Traffic Monitor The Traffc Monitor section provides the real time server status for Web server FTP server and DNS server Please refer to Chapter 12 Traffic Mon itor for details 4 5 12 User Settings This section is used to set up users for various Tenon s Tools services in cluding Web FTP and Mail Please refer to Chapter 16 Us
48. L Rewriting Legging Settings For DEFAULT Error Log Logs error_kg A Custom Logs common s ser a pA S User Agent E Click the lock to rastro access NOTE if you change the location of your log file make sure that the directory exists and is writable by the user www otherwise your webserver may fail to start 17 1 19 1 Error Log The Error Log entry in both the DEFAULT virtual host table and the Virtual Host Configuration table is the name of the file iTools uses to log information about Web server errors If an Error Log file is not specifically set for a virtual host the Error Log file setting in the DEFAULT virtual host table will be used Errors included in this log include File Not Found errors and errors found when trying to execute CGls or start the server It is the first place to look when a problem occurs with starting the server or with the operation of the server since it will often contain details of what went wrong and how to fix it 17 1 19 2 RotationTime iTools automatically allows users to create rotated logs without restarting of the web server Specify the period of rotation and the log files will be created with the given file name and appended with the Epoch date The log file can be viewed in System Status See Chapter 14 for details 96 17 1 19 3 Custom Log By default Apache will generate three activity logs access access from paticular IPs to specific URLs agent browsers bein
49. LES Mapping different part of the host file system in the document tree and URL redirection Mod_rewrite Powerful URI to filename mapping using regular expressions Mod_userdir User home directories Mod_speling Automatically correct minor typos in URLs Mod_vhost_alias Support for dynamically configured mass virtual hosting A 4 Directory Handling Mod_dir Basic directory handling Mod_autoindex Automatic directory listings A 5 Access Control Mod _ access Access control based on client hostname or IP address Mod_auth User authentication using text files Mod_auth_db User authentication using Berkeley DB files Mod_auth_anon Anonymous user access to authenticated area Mod_digest MD5 authentication A 6 HTTP Response Mod_headers Add arbitrary HTTP headers to resources Mod_cern_meta Support for HTTP header meta files Mod_expires Apply Expires headers to resources Mod_asis Sending files which contain their own HTTP headers A 7 DYNAMIC CONTENT 133 A 7 Dynamic Content Mod_include Server parsed documents Mod_cgi Invoking CGI scripts Mod_actions Executing CGI scripts based on media type or request method Mod_perl Speeds up Perl scripts by keeping them loaded into memory A 8 Internal Content Handlers Mod_ status Server status display Mod_info Server configuration information A 9 Logging Mod_log_config User configurable logging replacement for mod_log common Mod_usertrack U
50. Lbrary Tenor Webterver Logs eccess_log 160860 lines in log View lines t 1 6 View 127 127 127 127 127 127 admin J 0 J01 2004 01 52 921 admis 10 J01 2004 101 153 32 admin 10 01 7004 101153132 adamiz 310 J01 2004 101 153 32 admin 10 01 7004 1011453132 a miz 10 J01 2004 101 153 32 0700 0700 1 0700 0700 0700 07001 less istylo crs HTTP 1 17 200 4649 licon trans qif WTTP 1 1 200 49 icon content top right gif WTTR 1 1 licon t top 1left qif MWTTP 1 1 200 421 icon tetop gift HTTP 1 1 200 802 licon t top right gif NTTP 1 1 200 420 2194 429 127 AMIA 10 501 7004101153132 pom n 127 127 127 adain Rin adaa 1 734 20kb 000000000 KE AA ean ee 0 0 0 0 0 0 0 0 0 0 w p 10 J01 7004 101 153 32 10 301 7004101153132 10 J01 27004 101 153 32 0700 0700 0700 0700 heon iteole gift WTTP 1 1 flicon clock pno TTP 1 1 f ieon Ous git WTTP 1 1 licon File qif NTTP 1 1 200 3094 200 7444 200 4508 200 3140 14 2 LOG REPORTS 75 14 2 5 Raw FTP Logs The Raw FTP Log pull down menu contains a list of the default FTP log Files from Library Tenon FTPServer Logs This function will display the entire log file therefore you need to be careful about using this feature with large log files Main Menu Help Library Tenon FTP Server Loga xfer log 227 lines in log
51. MySQL Server O Restart Service Stop Service Ea Oae second avg 0 000 Click the hostname to see service detalls Click the lock to restrict access 14 1 1 Launch on Reboot The Enable On Startup button can toggle the service to launch when the computer is rebooted 14 1 2 Restart Service Clicking on this button will cause the service to completely restart its oper ation If the service is currently running this button will shut down the service and restart it again If changes are made directly to the services configuration files it is necessary to restart the services in order for these changes to take effect 14 1 3 Stop Service If the service is active clicking on this button will stop the service 14 2 LOG REPORTS 71 14 2 Log Reports The Log report screen creates summary reports of Web and FTP traffic logs statistics This allows an administrator to keep an eye on the server even from a remote location Main Menu System Status Log Viewer Log Reports Help web Log Report hellokety com 2 F view Click the lock to restrict access Mel Log Report F N View Cic the lock to restrict access FTP Log Report 5 View Click the lock to restrict access 14 2 1 Web Log Report When a virtual host is created the virtual host will display in the pull down menu for the Web Log Report Select the virtual host to see its statistics report 72 CHAPTER 14 SYSTEM STATUS Main
52. O A E 24 AD Maik SEHN Sea E A stastduactamakcecco elias s i taueselehes 24 LO INCUWOEK Se Lanas ic di 24 A OY Stent ota tl atadds 24 430 LOY SLED Updated 24 ADSL rare Montoto 25 BD AZ User DEINE pc 25 ADO VY CO A en tacerems N 25 DC TOM OD SOLUS A TA baat oqussonsausyceanbenllecee tess 26 5 1 Lo Add Or Modity Ae CON OD asas Dio 26 Du Delete a ron loba rl isis 26 DNS ae 28 6 1 Configuring and Administering DNS ooconccnicnincnnannnninonnnancnnanicanacaninnanacnnaso 28 62 Running Tools With DNS Osio merlo illo d ciles 29 6 3 Rimming d Tools With DNS OR pesitos iindso 29 6 41 FOOIS DNS A Gini Sad ON arei sanera ts 29 Oro Amar ZONES dei 29 0 0 New Primary ZOne ii 29 2 POM al NN RR 30 6 5 3 Refresh Retry Expire And TTL Values ooononcicnonicnnnncnnnnnonannoranncnannono 30 6 5 4 Authoritative Name Server and Hostmaster Valu sS ooccccnc n 31 6 029 Configuring Entries tor a LONE cts d nr 31 BO SLATE OL AQUO ii 32 O 32 G FORE n E as anes etal aE a eeneeae 32 OFRE 4 SNL EM OreRR eT rere COT TCE ee ere Ter Te ere rere er rete reer cen ce yr rn 32 Oca Name SOLVES aii taco 33 6 5 14 Primary VS Secondary Name ServerS enmedio 33 6 9 19 Adding Name Servers Pot A ZONE ssisscsgnsstssnccessavesessangtaconiventussaouieaes 34 00 ODO MATA IN AMC idad 34 A HOSE NINE tiea iuaces tat E aumeubesteeians 34 6 5 18 Host Name A RecordS coococcccnnonnccnonannconannnncnonannnanononnncnonananoninnnnac ns 34 SE POs AGS a A O georsaea oes
53. Overview Server Name I Addrece Port Settings tnable d DEFAULT 20 Configuration y C 1 mac your domain corn 292 160 1 105 a0 Configuration Add Arrange Order Click on the Web Settings icon and click on Adad Virtual hosts can be added by entering a hostname IP address and port number New Virtual Most Server Name IP Address LAD mac your domain com 192 168 1 105 f Add Virtual Host Click Add Virtual Host to confirm the addition of the new virtual host For now the important thing is to make sure that the Directory Index field contains the name of the index file for your web site Also if your site is to be accessible from multiple URLs such as www your domain com and your domain com make sure that the other ones are listed separated by spaces in the Server Aliases section 20 CHAPTER 3 ITOOLS QUICK START Virtual Hosts Access Controls MIME Settings Cache Settings Proxy Settings Advanced Settings Help Configuration Aliases Error F es Logging Redirects URL Rewriting Virtual Host Configuration Mac yow domain con Server Name mac your domain com 16 Address 192 168 1 105 Port 80 SSL Securtty On gt tdt Certificate Document Root Ubrary Tenon WebServer WebSites maec your domein cor A Server Admin Server Aliases Server Path Directory Index index html index html var er Hostname Lookups on SSL Certficate File
54. ROXY SETTINGS 123 domain name is encountered a redirection response to the same host with the configured domain appended will be generated 17 6 4 Proxy Timeout The Proxy Timeout directive allows a user to specify a timeout on proxy requests This is useful when you have a slow buggy application server which hangs and you would rather just return a timeout and fail gracefully instead of waiting however long it takes the server to return 17 6 5 Max Forwards The Max Forwards directive specifies the maximum number of proxies through which a request may pass This is set to prevent in finite proxy loops or a DoS attack 17 6 6 Error Override The Error Override directive is useful for reverse proxy setups where you want to have a common look and feel on the error pages seen by the end user This also allows for included files via mod_include s SSI to get the error code and act accordingly default behavior would display the error page of the proxied server turning this on shows the SSI error message 17 6 7 Preserve Host When enabled this option will pass the Host line from the incoming request to the proxied host instead of the Hostname specified in the proxypass line This option should normally be turned off 17 6 8 No Proxy The NoProxy directive specifies a list of words hosts and or domains sepa rated by spaces HTTP and anonymous FTP documents matching any words hosts or domains are not cached by the proxy s
55. SSL Certificate Key File _ Delete Vetus Mort mac yor domain com Click the lock to restrict access If you make changes to the virtual host configuration click Save to save the Virtual Host configuration The web pages go into the folder which is automatically created Library Tenon WebServer WebSites www your domain com For now you re all set Your first host is up and running and can be accessed with a browser 4 Tools Administration Server Using iTools Administration Server iTools services Apache DNS FTP SSL etc can be configured using a web browser The browser may be running directly on an iTools system or on a remote host connected via a network to the iTools system The web browser interface includes easy to use tables and forms that eliminate dealing with cryptic Apache directives Built in error checking identifies redundant or incomplete entries Updates are immediately available to the network And of course all documentation is available on line via the web Tools Administration Server is a stand alone special purpose web server that runs within iTools This server uses different port numbers than the Apache web server the defaults are port 84 and 85 4 1 Connecting to the Administration Server Tenon s iTools Administration Server is automatically started when your server boots up You can connect to the Administration Server remotely using any web browser For example if you
56. Server These features are configured by editing FTPs directives in the Library Tenon FTPServer Configuration proftpd conf file The documentation for the ftpaccess file is available at http www proftpd org S File Manager Using the File Manager you can upload create or delete files organize files in folders and change file permissions The File Manager is not intended to replace any content creation tools you may be using but it offers a simple way to make small changes on your site via the web without having to use the Terminal application or a third party FTP tool Note All of the other topics in this section assume that you are already in File Manager To open and navigate in File Manager e Click on the File Manager button on Tools Administration Server Navigate by using the following e Open a folder by clicking on the folder icon e Use the path links at the top of the window to move up and down the path e Select a folder or a file so as to view or modify its properties by clicking on the name link 8 1 Creating a new folder Folders are a very useful way of adding organization and structure to your web site They make maintenance of the site much easier as you can easily see what files are in which folder Most web sites include at least an image folder to keep all the image files separate from the HTML files To create a new folder Navigate to the area in which you will create the new folder
57. TINGS 6 DNS 6 1 Configuring and Administering DNS The Domain Name System DNS acts very much like a telephone company directory assistance service It provides mapping between Internet host computer names and Internet IP addresses Given a host name it will look up and return an IP address Without DNS entries your server has the equivalent of an unlisted telephone number The Domain Name System itself is a distributed database of domain names and Internet addresses DNS translates names for example ftp apple com to IP addresses for example 17 254 0 26 and vice versa A client server scheme supported by replication and caching enables these mappings to be available throughout the Internet Domain name servers make up the server half of the client server mechanism Name servers contain information about some segment of the DNS database and make that information available to clients called resolvers Tools DNS includes a complete implementation of the Berkeley Internet Named Domain BIND DNS version 9 BIND version 9 is the latest version of what is considered the definitive implementation of the DNS protocol The software is maintained and continually enhanced by the Internet Software Consortium http www isc org This latest version includes significant enhancements including performance improvements and security related fixes BIND under Tools functions independently of Apache and has been designed to either
58. can be selected 17 3 ACCESS CONTROLS 111 ExecCGI Execution of CGI scripts is permitted Follow SymLinks The server will follow symbolic links in this directory Even though the server follows symlinks it does not change the pathname used to match against lt Directory gt sections Note also this option gets ignored if set inside a lt Location gt section Server Side Include No Exec Server side includes are permitted but the exec cmd and exec cgi are disabled It is still possible to include virtual CGI scripts from a Script Alliased directory Display Indexes If a URL that maps to a directory is requested and there is no Directory Index e g index html in that directory then the server will return a formatted listing of the contents of the director MultiViews Content negotiated MultiViews are allowed Follow SymLinks if Owner Match The server will only follow symbolic links for which the target file or directory is owned by the same user id as the link Note this option gets ignored if set inside a lt Location gt section 17 3 7 WebDAV WebDAV allows users to place and manipulate files in a directory on your web server This means that you should take particular care in configuring your WebDAV server When you enable WebDAV for a directory or location you should also enable authentication and authorization for that space If authorization for authenti cated users is not enabled then an anonymous
59. continue to be responsible and authoritative for the reverse zone For example a reverse lookup of IP 216 102 92 1 returns 1 92 102 216 in addr arpa 7200 IN PTR adsl 216 102 92 1 dsl snfc21 pacbell net Indicating that this is an ADSL connection belonging to Pacific Bell No tice the structure of reverse records it s the IP address inverted with in addr arpa added on If your organization has less than a full class C block of IP addresses 256 addresses you likely do not have reverse authority for your IP numbers Classless delegation meaning reverse delegation of less than a full class C is possible but not all ISPs are willing to provide this service 6 5 22 1 Adding a PTR Record The New Reverse Zone page is accessed by selecting the Reverse Zone entry from the navigation bar This page is used to enter the PTR records of a class C IP address Each IP Node must be unique within the zone When adding new hosts it is not necessary to append the Domain Name at the end of the Host Name iTools automatically expands them However if you do enter the domain name portion you need to add a trailing period If a trailing dot is omitted on an entry that contains the full domain name the host record ends up with an extra copy of the domain name appended this won t work correctly Enter the new Hostname in the Hostname field and an IP Node in the Internet dot notation for example 1 for the IP
60. d in Chapter 2 Installing iTools Section 2 2 Pre Configuration on page 9 6 4 1Tools DNS Administration Tools contains an integrated browser based interface for configuring your DNS zones Changes to the DNS databases are automatically merged into the running DNS If you hand edit DNS config files you will need to reload the database to update the server a reload can be performed by restarting the DNS service from the System Status page When you select the DNS Settings button from the Administration home page the web page displays a listing of the Primary Zones currently being managed by this system The DNS Settings page also presents buttons for creating new Primary Zones creating new Secondary Zones and new Reverse Zones On initial launch Tools may create a Primary Zone for the domain configured during the install process 6 5 Primary Zones 6 5 1 New Primary Zone From the main DNS Settings page click on the New Zone to add a new primary zone This page is used to enter the Domain Name of a Primary Zone to be managed by this system The Domain Name must be unique no other Primary or Secondary Zone may have the same Domain Name on this system The name entered here should correspond to a domain name registered at a company such as Register com or Network Solutions 6 5 PRIMARY ZONES 31 Main Menu Primary Zone Secondary Zone Reverse Zone Help exampte com hello com Refresh your domain com 1 hour
61. de US United States tree Address vo tenon com Generate Netecape Server CER ave Check the lock to restrict access 17 2 4 1 Common Name The Common Name is the domain name of the web server or of an IP based virtual host This must be a fully quali ed domain name not an IP address or a DNS alias 17 2 4 2 Organization Name The Organization Name is the legal organization or business name that will appear in the certificate 17 2 4 3 Organizational Unit The Organizational Unit is the department name or the name of a unit within an organization This field is optional If this field is omitted you must put a In the field 17 2 4 4 Locality The Locality is the name of the city in which the organization resides This field is optional 104 CHAPTER 17 WEB SETTINGS 17 2 4 5 State or Province The State or Province is the name of the state or province in which the organization resides 17 2 4 6 Country Code The Country Code is a two letter code for the country in which the organi zation resides If anything other than a valid country code is entered a CSR will not be generated The correct Country Code for the United States is US 17 2 4 7 Email Address The Email Address is the email address of a contact or representative within this organization 17 2 4 8 Generating a CSR To generate a Certificate Signing Request CSR save the SSL Settings via the Save CSR button This action has several
62. delivery is attempted mail will instead be delivered to the second one in precedence That mail server will hold the mail until it can be delivered to the first mail server for delivery to end users If the secondary mail server is down mail goes to the next server in precedence and so on if there are additional backup mail servers A smaller precedence number means that server is closer to the head of the line for delivery of mail 0 mail delivered here if the server is up and reachable 10 this server is second in line and gets the mail if 1st is unavailable 20 third in line gets mail if both 1st and 2nd are unavailable and so on The absolute values used are arbitrary what matters is relative value in relation to the other Mail Exchanger records for this zone and host This model assures that mail will get delivered to your domain even if an individual mail server is down Mail Exchangers are commonly referred to as MX records To access the Mail Exchanger listings for a host go to the Primary Zone page and click on the domain for which you want to view Mail Exchange records Doing so brings up a page listing the information about the currently configured domain 6 5 20 1 Adding Changing Mail Exchange Records To add a mail server for a host in the Primary Zone page scroll to the rows that displays Type as MX records Fill out Domain Name and Hostname 6 5 PRIMARY ZONES 39 Enter the host name for the mail serve
63. ditional requests however a new connection establishment overhead is incurred The Keep Alive Timeout setting is ignored if KeepAlive is Off 17 7 11 Hostname Lookup lt TBD gt 17 7 12 Canonical Name lt TBD gt 17 7 13 Server Signature lt TBD gt CHAPTER 17 WEB SETTINGS 17 8 Apache Module Configuration The Apache Module Configuration button takes you to a page which displays information about what modules are loaded The actual window contains many more entries this is just a small sample See Appendix A Apache Modules for a complete listing of all Apache modules included with iTools with a brief description of the module The Appendix also includes details about using this configuration page Main Menu Virtual Hosts Access Controls MIME Settings Cache Settings Proxy Settings Advanced Settings Help Runtime Settings Modules Config Editor Apacha Modules Module Meme Fle Name Enabled acort module fUbsrary Tenon WebServen Moduler mod_saccere co ath _ module Ube ary Tenor WebServer Modules mod_euth so ath_anon_module fUbrary Tenor WebServer Modules mod_euth_anon 2o ath dbm module IUbrar Tanon WebdServern Moduler rmod_suth_dbrm so ath_digest_modwie Lbeary Teron WebServer Modules mod_euth_digest so cache_module fLUbrary Tenon WebServer Modules mod_cache ro dith_cache_ module Ubrary Tenon WebdServer Modules rod _ disk cache so mern_cache_rmodule Ubeary Tenor WebServer Modes iod
64. ds for example your computer s Ethernet card Firewall Settings lets you set up filters to block unwanted network communication 13 1 Configure IP Addresses Clicking on the Network Settings button in the Administration Server home page will bring up the Network Settings Screens Clicking on Network Settings will let you assign IP addresses to the various machine interfaces The list of interfaces on the left are the network interfaces currently detected on the system In general IP addresses will bind to the Ethernet interface en0 enl Main Menu Network Settings Firewall Settings Help 00 Interface Name end gif 10 Address Netrrniass stio end 192 168 1 105 255 255 255 0 n Click the lock to rertrict ccess The IP address is the 32 bit Internet host address de ned by the Internet Protocol in STD 5 RFC 791 and usually represented in dotted decimal notation 65 66 CHAPTER 13 NETWORK e g 128 121 4 5 The address can be split into a network number or network address and a host number unique to each host on the network and sometimes also a subnet address The way the address is split depends on its class A B or C as determined by the high address bits Class A high bit 0 7 bit network number 24 bit host number n1 a a a 0 lt nl lt 127 Class B high 2 bits 10 14 bit network number 16 bit host number n1 n2 a a 128 lt n1 lt 191 Class C high 3 bits 110 21 bit network number 8
65. e To change any of the information for the Master Servers for this Secondary Zone modify any of the IP Addresses in the list Select the Save button to submit the Secondary Zone information The new information will be updated in the Secondary Zone s records and will be presented in the Secondary Zone Page the next time it is accessed 6 6 3 Deleting a Secondary Zone Secondary Zones are listed along with Secondary Zone table Select the zone you wish to delete and click Delete button to save your changes 6 6 4 Converting a Secondary Zone To a Primary Zone If you wish your server to become a primary server for a secondary zone you can click the Convert to Primary button to make that zone a primary zone You must wait until bind has downloaded the zone information from the master server and a db s your domain com file has been generated for the domain before attempting to convert to primary This is useful when transitioning from a different DNS server to BIND with iTools 6 7 DNS Database Files The Library Tenon DNSServer Configuration directory holds the database files for BIND DNS under iTools The database can be viewed using any text editor Primary Zones on this DNS server each have a db file For example the do main companyl com has database file in the listing called db company1 com Secondary Zones each have a db s file In our example we had a secondary domain called organization2 org whic
66. eatures such as anonymous FTP FTP virtual hosting and fine tuned controls on upload and download access to the iTools server The iTools FTP implementation can also be configured to allow or deny anonymous or iTools user access to the servers file system Secure data transfers are supported using FTP TLS SSL 45 46 CHAPTER 7 FTP 7 2 FTP Settings Main Menu FTP Settings Help General FTP Settings FTP Login Type User Limit FTP Log Y anonymous 10 Y Log Transfers V UsrerfParrword 10 Y Log Transters Advanced FTP Settings server Admin admin your domain com Por 21 Pattive Port Range 49152 a 65534 Login Timeout l seconds Idle Timeout Ti teconde No Transfer Timeout xX seconds Stalled Transfer Timeout seconds Command Buffer Size f characters Allow Root FTP Login EXTREMELY INSECURE Save Click the lock to restrict access The FTP server is an integrated component of iTools and is designed to provide separate access points based on virtual hosts for different FTP users The FTP Settings table contains some options that control the iTools FTP service The FTP server can also be configured to permit or deny anonymous FTP access off by default for security and FTP transfers can be logged for either anonymous or password based accesses 7 2 1 Anonymous The Anonymous check box enables or disables anonymous FTP access When a user accesses the iTools system via anonymous FTP the iTools FTP server automa
67. econdary Name Servers These terms have two different meanings depending on whether you are referring to name servers for this zone or other name servers that will query them 6 5 PRIMARY ZONES 35 The way primary and secondary name servers relate to each other is that the secondary is a slave to the primary master server Editing of individual DNS records happens on the primary name server the secondary name server s records are updated and validated at the Refresh interval specified in the Refresh for the zone To other names servers the primary and secondary names servers are all considered to have valid information for the zone Other name servers will check the response time of all name servers listed for the zone and preferentially query the one with the fastest response time If the first DNS server queried doesn t respond the other DNS server might then try one of the others authoritative for this zone 6 5 15 Adding Name Servers For A Zone There should be an initial name server added when you add the primary zone which corresponds to the Authoritative NS entry If any of these entries are not name servers for this zone delete them Be sure that there are a minimum of two valid name servers entered for each zone You will want to add all name servers for this zone Click the Save button to get more blank rows to enter additional name servers Enter a dot at the end of the Host Name of the DNS server to preve
68. ed Restrictions are user authentication based Selected users or groups are given access when the correct username and password have been entered Domain Name Based Restrictions consist of a set of rules that define when to allow access from browsers connecting from some IP addresses or domains and deny access to browsers from some other IP addresses or domains The user accessing this location must satisfy e Both domain based restriction AND realm based restriction e Either domain based restriction OR realm based restriction This option is only useful if access to a particular area is being restricted by both username password and client host address In this case the default be havior AND is to require that the client passes the address access restriction and enters a valid username and password With the OR option the client will be granted access if they either pass the host restriction or enter a valid username and password This can be used to password restrict an area but to let clients from particular addresses in without prompting for a password This page also includes options for MIME Type Overrides and Action Handler Overrides which affect MIME headers for specific directories and files 17 3 6 Options The Options directive controls which server features are available in a par ticular directory Options can be set to None in which case none of the extra features are enabled or one or more of the following
69. edirect can be created in the normal virtual host to redirect all traffic to the secure virtual host 106 CHAPTER 17 WEB SETTINGS 17 2 5 2 Using Multiple Certificates Every SSL connection requires a unique IP address Because Tools supports IP based virtual hosting you can easily set up multiple secure IP based virtual hosts Each secure IP based virtual host will need its own Certificate 17 2 5 3 Safeguarding SSL Keys And Certificate Each SSL Certificate works in conjunction with the SSL Key file that was produced during the creation of the Certificate Signing Request SSL Certi cates do not stand alone They require the SSL Key file to perform encryption SSL Certificates will only work with the corresponding SSL Key file that was used to produce the actual Certificate Signing Request The SSL Key file is your private key that ensures that no one can replicate or assume your site s identity on the Web If the SSL Key file is compromised the inherent security of your SSL Certificate is lost If the SSL Key file is lost the SSL Certificate is useless and a new certificate will have to be issued As you can see it is important to preserve a copy of your SSL Key file and to protect it against theft In iTools the SSL Key file is tightly protected against unauthorized access for example CGIs cannot read the SSL Key file The SSL Key file is generally located in the folder Library Tenon WebServer Configuration ssl keys
70. effects If a private key for this virtual host does not exist such a key is created and saved in a secure area in iTools s directory structure Library Tenon WebServer Configuration ssl keys This SSL Key le is important and should be saved once a CSR is produced See section Safeguarding SSL Keys And Certs on page106 The actual Certificate Signing Request information is displayed in the iTools Administration Server This CSR is a PEM encoded document which may be e mailed to the CA or it can be copied and pasted into an on line certificate request form This CSR is also saved in a file called virtualhost csr in the folder Library Tenon WebServer Configuration ssl crt Virtual Hosts Access Controls MIME Settings Cache Settings Proxy Settings Advanced Settings Help Virtual Host Oyarn aw Cor guration 00 Corfigurinion Arrange Order 1702 00 la 105 A temporary self signed certificate for use while your CSR is being pro cessed by the certificate authority is created and saved in the Library Tenon WebServer Configuration ssl crt folder in a file named lt virtualhost gt crt This file should be replaced by the real certificate when one is returned from the Certificate Authority The self signed certificate will allow your virtual server to perform secure transactions while your offcial certificate is being processed Browsers will question the validity of any server certi
71. er E eer 114 TZ AON EXEN ONS a 114 1744 Mime Lan Ua SOS a iaa 115 1743 Mime EI COGIING Se A 116 17 Cia 116 1 15 1 Cache Sets taa 116 15 2 Accelerator Cacharel cdt tds 117 14921 enore Cache ConTo bious a a 117 11022 Deul EEP E sii aid 117 175 23 Max EX DIC alas 118 17524 DENO Cahen nnn did 118 PSD ot e a a eer fee 118 17 53 l Cache ROO bu aci 118 Aa nc AO ns ido 118 17533 Garbage Collection Interval si rivocanidaiccin litis 118 17 5 SAC ace Directory Level traire ian a e 118 1759 Cache Directory Leng tisaini o ese usieneceseurneceae 118 T30 EXpirrGheck tn ud desata 119 ao als AAA a 119 177320 Maimun File SZC tt dod 119 17 5 3 9 Garbage Collection Max Memory Usage cccocccoccncononicnnaninnaninnno 119 TDA Memon Cache es a 119 AAS RE y o a ACI E et ree Tne Narre ener ee eae 119 175 42 Madman Object Contando 119 IL do Miimu OD ect iia 119 SA Maximunr Object ZE aenar ds 119 LAO PLOY OCN ida 119 AO LO NEques Si T E dn dseesetusal tivetdtieaneds 120 TAO LALO an 120 TOS LLO DOT aa 120 WAR A O 121 0 0 INO LLOVER 121 1 20 9 REMOS LOTES A de 121 176 10 Proxy IRCINOLE daa da 122 WE A N 122 176 2 OX ACCESS aida ab tds 123 17 6 13 Domain Name Based Restrictions ooconoccncnionancnnonaninnnnaninnnnaninonnnns 123 170 ATOY AA aglarea es toed wtaies 123 17 7 Advanced etnias 124 17A TN eD DCEVER Iy Ponnan n E ETEEN 124 TARA WACKO VETO ia 124 TA MIX O o aI E TE E aca nip eens 125 17 74 Max Spare Threads ito 125 1775 MAINS ATE Thread dan 12
72. ers and Group for details 4 5 13 Web Settings This section provides configuration options for the Apache Web Server Please refer to Chapter 17 Web Settings for details 5 Cron Job Settings The cron daemon is an automatic task machine This is a powerful tool that enables you to perform repetitive tasks at specific intervals on your webserver For example you could add a cron job that automatically copies an MySQL database to a separate location on your site as a backup 5 1 To Add Or Modify A Cron Job e Click on the Cron Job Settings button on the home page e Enter the command that you want to run in the Command to run field e Click on one option from each of the available lists e Enter the times for the cron job in the minute hour day month or weekday fields You can use star as wild card to represent every cycle For example a star in hour means every hour In addition you could also use numeric expressions such as 1 2 3 to represent from 1 to 3 for example to indicate the first three months first three days or first three hours You could also specify 15 in minutes represent every 15 minutes e Enter the cron job script in the Command field Click on the Save button Your cron job has now been added or updated 5 2 Delete a Cron Job Remove the command field to remove the specified cron job Click on the Save button Your cron job has now been deleted 27 28 CHAPTER 5 CRON JOB SET
73. erver During startup the proxy module will also attempt to determine IP addresses of any list items which may be host names These IP addresses will also be cached for use in the match list In the following example some host co uk widgets doodads com widgets doodads com would also be matched if referenced by IP address Note that doodads would also be sufficient to match doodad com Note also that disables proxy completely 17 6 9 Remote Proxies Remote Proxys are other proxy servers that this proxy server may interact with to satisfy a proxy request 124 CHAPTER 17 WEB SETTINGS Virtual Mosts Access Controls MIME Settings Cache Settings Proxy Settings Advanced Settings Help General Settings Proxy Access Remote Proxies Remote Prony Setting Forvard Matcher To Remote Proxy Servers Proxy Map Rernote Servers To Local URLs ProxyPare 17 6 10 ProxyRemote The ProxyRemote setting speci es which remote proxy servers are accessible to this proxy server Each line in the ProxyRemote text edit field defines a match string and a remote server to service URLs that match that string The match string and the remote server are separated by a space The match string is either the name of a URL scheme that the remote server to indicate that server should be contacted for all requests The remote server field is the URL for the remote proxy server Its syntax is http lt Ho
74. erverRoct is prepended so Logs foo log 2 with ServerRoot set to Limrary Tenon WebServer will be interpreted by the server as USrary Tenon WebServer Logs foo log 22 Section 1 Global Environment Eg F The Grectives im this section affect the overall operation of Apache such as the number of concurrent requests it can handle of where it can find As configuration Mes r 130 CHAPTER 17 WEB SETTINGS Appendix A Apache Modules One of the most powerful features of Apache is its ability to use dynamically loadable modules to increase its functionality and flexibility as the end user s needs grow Such add on modules include SSL FastCGI and many others Though Tools comes with a vast array of Apache modules both from the Apache source itself and modules from third parties the user may still find the need to expand Apache s capabilities further Below is a list of all the modules that come as part of the iTools distribution A 1 Environment Creation Mod_env Passing of environments to CGI scripts Mod_setenvif Set environment variable based on client information Mod_unique_id Generate unique request identifier for every request A 2 Content Type Decisions Mod_mime Determining document types using file extensions Mod_mime_magic Determining document types using magic numbers Mod_negotiation Content negotiation A 3 URL Mapping Mod_alias 131 132 APPENDIX A APACHE MODU
75. estart whenever a configu ration change mandates a restart Alternatively the iTools administrator can choose to restart services manually after all the settings are properly configured Main Menu Tools Settings Tools Hostname Help iTools Settings Y Automatically restart Tools Services wnen settings changed Use the Tools Hostname form to set the hostname for your system This information will be saved in the etc hostconfig file Main Menu Tools Settings Tools Hostname Help Your current host name s testing tenon com Your current hostname setting is testing tenon com 55 CHAPTER 9 TOOLS SETTINGS 10 License Information To change the license enter your permanent license in the text field being careful to observe case sensitivity and click Save The license program will return information about the validity of the license you have entered and for what time period it remains valid Main Menu License Information Help Current License Information Your current license number is 1 6 12 3fff0779e 21017938 714 912 4IT You have a temporary license number valid until Thu Mar 12 16 28 31 2009 Your license number is valid Enter new license number 1 6 12 3fff0779e 21017938 714 912 4IT 58 CHAPTER 10 LICENSE INFORMATION 11 Mail Settings The Mail Settings control the configuration of Apple s in place sendmail or Postfix mail server or if Tenon s Post Office is ins
76. ficate signed by an au thority of which they have no knowledge The temporary self signed certificates should in no way be construed as proof of the virtual host s identity to your browser clients In some cases such as in a corporate intranet a temporary self signed cer tificate is all that is necessary See section Self signed Certificates on page 106 for more about these 17 2 5 Enabling SSL Once you have a certificate even an iTools generated temporary one you will be able to create a secure virtual host by toggling SSL Security On in the Virtual Host Configuration table SSL Security Off Edit Certificate 17 2 5 1 Secure and Non secure Virtual Hosts Tools supports virtual hosts with both secure and normal not secure ser vice This configuration is represented in the Virtual Hosts Table by two entries with the same virtual host name One entry will have the SSL designation and one will not To create a virtual host with both secure and normal service first create the virtual host if it is not already created and follow the instructions to make this virtual host secure Next create a new virtual host using the same name The second virtual host is created without SSL enabled Both virtual hosts will initially share the same DocumentRoot Either virtual host can be moved to a new DocumentRoot if this shared configuration is not desired If you desire all traffic to be directed to the secure virtual host a r
77. g either Hostname in their web browser will get the same content If the virtual host was added as www your domain com your domain com would be added here instead 17 1 11 Server Path In some cases a web site previously accessed via a non virtual host URL on this server such as http www your domain com some small business wishes to convert to a real virtual host Once the proper DNS entries and domain registration occur the virtual host some small business com can be cre ated But what happens to requests for the old legacy URL The Server Path field can direct the request to the correct place This field is also used when the Web server receives a request from a browser incapable of supporting host header based virtual hosts If this virtual host s home page was previously accessible via a non virtual host URL like the example above the old or legacy file path portion of the URL is entered here Otherwise this path should be blank The Server Path is set initially to a path beginning with a slash followed by the virtual host name e g your domain com 17 1 12 Directory Index The Directory Index setting controls which file is returned when serving a request for a URL that points to a directory rather than a request for a 92 CHAPTER 17 WEB SETTINGS specific page This may be what you want for example for a directory of downloadable files This includes a request for the main page of a websi
78. g used to view your sites and referrer referring URLs that direct users to your site The combined log format combines all three of these logs into one log file This allows logging analysis software to deal with one file per domain The Custom Log entry specifies a log format as defined by the Log Format section on page 96 and a log path 17 1 19 4 Script Log The Script Log setting is the name of the file used to log information about errors in CGI scripts This feature will only be displayed in the DEFAULT virtual host This feature is meant to be used as an aid in debugging CGI scripts and should not be used continuously on an active server It is therefore not entered by default but can be activated by specifying a file in the given form field 17 1 19 5 LogFormat The Log Format setting is a string that controls the format of the log file The log file can include literal characters copied from the log format setting and detailed information specific to the actual request that is being logged Details are encoded using a percent sign followed by a letter Each followed by a letter is a directive to the Web server for a specific piece of information about the request being logged For example h logs the name of the remote host placing the request if hostname lookup is turned on These log formats can be given nicknames that can be used to format cus tomized logs specified by the Custom Log directive
79. h shows a database file in the 6 7 DNS DATABASE FILES 43 listing named db s organization2 org The secondary zone file data is obtained from a Primary Master DNS server for the zone and should not be edited Reverse Zone Lookup files are designated as db xx xx xx where the xx xx xx represents the IP number In the above list of files several represent reverse zone data one example being db 192 83 246 The startup file for BIND is named conf It contains the list of zones both primary secondary and reverse managed by this iTools server the names of their corresponding database files and any DNS options The name root file contains the names of root domain servers used to initialize the Tools DNS cache Root servers know what DNS server is author itative for top level domains such as com and edu In most cases root name servers do not themselves provide the final answer to a query for the IP of a requested Hostname instead they refer to a DNS server that may have the answer They are iterative rather than recursive in their behavior This file should generally not be edited CHAPTER 6 DNS FTP 7 1 The File Transfer Protocol The File Transfer Protocol FTP allows the transfer of files between net worked computers The FTP service provided with Tools is based on the ProFTPD project source and is integrated into the Tools suite of applications The Tools FTP Server provides advanced f
80. he docimentation 122 CHAPTER 17 WEB SETTINGS Main Menu Virtual Hosts Access Controls MIME Settings Cache Settings Proxy Settings Advanced Settings Help General Settings Proxy Access Remote Proxies General Proxy Setting Prony Requests of Proxy Vie On E Prony Domen Proxy Timeout Max Forwards Error Overnde ow 2 Precerve Moet oa 1 Mo Pro The following domeng submets IPs of hosts wil be connected to directly Click the lock to rertrict accese 17 6 1 Proxy Requests The Proxy Requests setting controls whether the proxy service is On or Off This setting is Off by default 17 6 2 Proxy Via The Proxy Via directive controls the use of the Via HTTP header by the proxy Its intended use is to control the flow of the proxy requests along a chain Of proxy servers e If set to off which is the default no special processing is performed If a request or reply contains a Via header itis passed through unchanged e If set to on each request and reply will get a Via header line added for the current host e If set to block every proxy request will have all its Via header line removed No new Via header will be generated 17 6 3 Proxy Domain The Proxy Domain directive is only useful for Apache proxy servers within intranets The Proxy Domain directive specifies the default domain which the Apache proxy server will belong to If a request to a host without a 17 6 P
81. hed on the server for the user support they would not need an entry That user would automatically get mail for the e mail address support all of the enabled Local Host Names If the user support requested that their account also receive all of the mail for help localhostname but there is no help account established or it is in use by another client help localhostname should be added in the Virtual User column and support would be added the Local User column The pull down menu is added as a convenience to list the Local Host Names for the server but does not need to be used to add a virtual user 11 1 SENDMAIL POSTFIX CONFIGURATION 61 In the event that different domains need separate accounts for the same user name virtual users would be added for both of the domains and would be mapped to accounts with different names as in the example figure below Main Menu Local Host Names Relay Domains Viruta Users Mall Aliases Help Virtua Users Map user domain to a local user VirtualUser Local User Alias or Error jim jimmy jett jeffery nsmaster postmaster f Save Click the lock to restrict access A catch all account may also be configured for a domain using the Virtual Users table This account will receive any mail for the specified domain regardless of the address domain to catch would be entered in the Virtual User field and the account name to receive the mail wo
82. ias of a Host Name record CNAME records e An IP Address to Name mapping PTR records e Mail Exchanger MX records e SPF Sender Policy Framework TXT records Any host names records entered that do not end in a period will have the zone name automatically appended on to them when the record is requested This is to make the set up of a zone faster but an administrator must remember 6 5 PRIMARY ZONES 33 that all fully qualified domain names and any names outside of the zone should have a period added to the end 6 5 6 Start of Authority From the Primary Zone page of the zone to be edited the top section is the Start of Authority where you can alter the values that govern how other Name Servers will communicate with yours to ensure that their data is up to date cone Name your domain com Refresh 1 hour Expire 1 week Retry 15 minutes Time To Live 1 day gt Authoritative Name Server ns your domain com Hostmaster dnsmaster your domain 6 5 7 Refresh The Refresh value indicates the interval for how often Secondary DNS servers for this zone validate and update their data if there have been changes to the records in the primary Master DNS server Most zones do not have rapidly changing data so a value of 3 hours to 24 hours is reasonable 6 5 8 Retry If the primary DNS server failed to respond at the last check the Secondary DNS servers for this zone will attempt to contact the Primary DNS server for
83. iating replacements Therefore in this case a smaller number of Max Requests Per Child leads to a faster reduction in web server processes If the Max Requests Per Child is set to zero a web server process will never expire 17 7 7 Timeout The Timeout setting controls the maximum time in seconds that the web server will wait for receipt of a complete incoming request once any initial part of an incoming request is received The Timeout setting also controls the maximum time the web server will wait to completely send a response If the sizes of the files used in the web transfers are large and the client s or server s network bandwidth is slow the Timeout setting must be increased to compensate 128 17 7 8 Keep Alive The Keep Alive setting controls whether or not the web server permits mul tiple incoming requests from a single client in a single connection Using Keep Alive reduces the overhead of connection establishment and termination for each incoming request 17 7 9 Max Keep Alive Requests The Max Keep Alive Requests setting controls the number of incoming re quests a client may embed in a single connection The Max Keep Alive Requests setting is ignored if Keep Alive is Off 17 7 10 Keep Alive Timeout The Keep Alive Timeout setting controls the length of time in seconds the web server will wait for additional incoming requests in a single connection If the Keep Alive Timeout expires a client can still send ad
84. iguration Fila To Edit File Ubrary Tenon WebServer Configuration hitpd com Open Fite 2 Based upon the NCSA server configuration files originally by Rob McCool r F This is the main Apache server configuration file It comtains the configuration directives that give the server Rs instructions 2 See lt URL Mtp Mtpd apache org docs 2 0 gt for deta ed information about the directives Do NOT simply read the instructions in here without understanding what they do They re here only as hints or reminders If you are unsure consult the online docs You have been warned The configuration directives are grouped into three basic sections 1 Directives that contro the operation of the Apache server process as a whole the global environment 2 Drectves that define the parameters of the main or default server weich responds to requests that aren t handled by virtual host These directives also provide default values for the settings of all virtual hosts 3 Settings for virtual hosts which allow Web requests to be sent to different IP addresses or hostnames and have them handled by the same Apache server process E z r z z E Configuration and logfile names If the fhenames you specify for many of the servers control files begin with or drive for Wn32 the server will use that explicit path If the filenames do not beg with the value of S
85. iles Logging Redirects URL Rewriting Redirect Settings For DEFALI Status Code URL Path Destination URL a 301 Moved Permanently tools admin mtps mac your domain com 85 Click the lock to revrtrict access Redirect settings specify URLs that are redirected or mapped to differ ent servers When a request is received with a URL that contains one of the redirected entries the client is instructed via a return code to access the data from a different server using the provided URL Redirect responses contain a reply code and may contain a URL The reply code can be chosen from a pop up list To create a redirect entry select the redirect reply code from the pop up list and enter the URL to be redirected into the URL Path field of the Redirect Settings table If necessary enter the new URL in the Destination URL field Click Save to save these settings Some reply codes require a destination URL and some do not If you select a reply code that requires a destination URL and do not provide one an error will be reported If you select a reply code that does not require a destination URL and one is provided the destination URL will be discarded when the settings are saved 17 1 VIRTUAL HOST 99 17 1 21 URL Rewriting Main Menu Virtual Hosts Access Controls MIME Settings Cache Settings Proxy Settings Advanced Settings Help Configuration Aliases Error Files Logging Redirects URL Rewrit
86. ing Virtual Host Defaults URL Rewriting Settings For testing tenon com URL path i e example RewriteCond Y Test String i e REMOTE_HOST Y REQUEST_URI gt Condition pattern i e host1 A css Flags Test case insensitive OR Combine with next condition RewriteRule y Pattern i e oldstuff htmis A css Substitution i e newstuff ntm Library Tenon EMU calendar ui default public css 1 Flags Chained with next rule 7 Case Insensitive No URI Escaping of output C Query String Append Force MIME Type i e application x httpd cgl Set Environment variable i e var val Set Cookie i e name value domain URL path i e example Rewriting URLs is very important especially on dynamic web sites where scripts can generate sometimes unwieldy query strings For example using URL rewriting you can change http www company com downloads category 897634598 into http www company com downloads itools Apache mod rewrite gives you the ability to manipulate URLs as a function of various conditions It caches URLs that meet specific conditions and then rewrites them according to special instructions The mod rewrite module is extremely powerful and very complex For details about mod rewrite we refer you directly to the Apache online documentation http httpd apache org docs 2 2 mod mod_rewrite html http httpd apache org docs 2 2 rewrite rewrite_guide html The URL Rewr
87. ion Server 9 0 2 System Wide Configuration for quebert tenon com e F Tools Settings Cron Job Settings DNS Settings FTP Settings G gua O e SA File Manager Help License Information Mail Settings e R PHPThumb Settings MySQL Database Settings Network Settings System Status i SA 22 Traffic Monitor System Update User Settings Web Settings This is the main menu of iTools Administration Server Each icon takes you to other pages with configuration options To set up virtual hosts you need to have valid DNS entries and valid IP address on the server CHAPTER 3 ITOOES QUICK START 3 1 DNS You may already have your DNS served by your ISP or some other provider however if you will be using Tools DNS services and you are familiar with setting up a DNS server read this section before proceeding If you are new to running a DNS server or feel uncertain about the DNS portion of iTools please read the full chapter about DNS before proceeding Click on the DNS button on the Admin home page The figure below shows the DNS zone list after adding an example primary zone To set up a new primary zone in iTools choose New Zone from the zone selection list The figure below shows appropriate entries for the new primary zone your domain com using an arbitrary IP address and for a PTR record Main Menu Primary Zone Secondary Zone Reverse Zone Help New Zone Zone Name your domai
88. ion is requested Action handlers can be defined for both MIME types and extensions If a handler is defined for a specific extension it overrides any handler specified for that extension s MIME type 17 4 MIME 117 To map a new extension to a MIME type or action handler enter the new extension into the empty text edit field in the bottom line of the Custom Extensions table Then enter the corresponding MIME type or select a handler from the pop up list or do both Click Save to submit the changes To change an existing extension its MIME type modify the extension or MIME type in the text edit eld Then click on Apply to submit the changes Tools includes a long list of well known extensions and their corresponding MIME types These extensions are displayed in the Built In Extensions table accessible via the Built In Extensions link and cannot be explicitly changed However these default extensions can be overridden by entering the extension in the empty text edit field in the Custom Extensions table and assigning it a different MIME type This extension will then appear in that table and the default setting will no longer appear in the Built In Extensions table If this extension is subsequently removed the default setting will remain and will reappear in the Built In Extensions table Overriding the default extensions in the Built In Extensions table is not recommended as this setting a affects all files with this extension on thi
89. ion section the Red Seal To enter or change the license login as the iTools Administrator admin enter your license in the text field being careful to observe case sensitivity and click Save The license program will return information about the validity of the license you have entered and for what time frame it remains valid Main Menu License Information Help Current License Information Your current license number is 1 6 12 3fff0779e 21017938 714 912 4IT You have a temporary license number valid until Thu Mar 12 16 28 31 2009 Your license number is valid Enter new license number 1 6 12 3fff0779e 21017938 714 912 4IT The next chapter is a Quick Start Guide to help you to set up your web server Later chapters contain detailed information about all aspects of the server and administration CHAPTER 2 INSTALLING TENON S TOOLS 3 Tools Quick Start Once iTools is installed on a properly networked machine you can start setting up your web server by connecting to the Tools Administration Server Configuration and management can be done from any platform by using the traditional browser based administration tools This chapter will show you how to use the iTools Administration Server to set up a virtual host Go to https ip address of yourserver 85 You will be presented with a login screen The default login is admin with password admin Change the admin password using User Settings iTools Administrat
90. istration Server while System users are created in the system user database While certain iTools users will show up in the system user database they will be marked as iTools users and should not be edited there The names of System users may be added into the Administration Server to give them access to realms but some settings including their home directory may not be edited in the Administration Server Tenon s iTools provides a set of realm based access controls that can restrict access to a particular file or directory based on user names and passwords see section Realm Based Restriction on page 111 for details on realms Tenon s Tools also provides FTP service based on user names and passwords User 79 80 names and passwords for both realm based access controls and FTP service are entered in the Users table iTools User Types Normal If a user is not FTP capable he or she has no Mac OS X privileges These users can be configured to administer the Tenon s iTools Administration Server see section The iTools Admin Group on page 83 or simply be allowed to log into realm protected directories via a web browser see section Realm Based Restrictions on page 111 FTP If an Tools Admin user is listed as an FIP user enough of a user environment is created to provide for the transmission and receipt of file data but with significant limitations An FTP user is not allowed normal timesharing login While
91. iting Settings in iTools lets you set various mod rewrite direc tives RewiteBase RewriteCond RewriteLock RewriteMap and RewriteRule When you make entries in URL Rewriting the RewriteEngine directive is automatically enabled Note These rewriting rules can be applied at a global site level using the DEFAULT host or they can be designed for specific virtual hosts on your site The URL rewriting module uses a rule based rewriting engine based on a regular expression parser to rewrite requested URLs on the y It supports an unlimited number of rules and an unlimited number of attached rule conditions for each rule to provide a really flexible and powerful URL manipulation mechanism The URL manipulations can depend on various tests for instance server variables environment variables HTTP headers time stamps and even external database lookups in various formats can be used to achieve a really granular URL matching 10 CHAPTER 17 WEB SETTINGS 17 1 21 1 RewriteBase Directive The RewriteBase directive explicitly sets the base URL for per directory rewrites In other words if abc def is the physical path of xyz i e the server has an Alias directive Alias xyz abc def nen using the RewriteBase Dire Main Menu Virtual Hosts Access Controls MIME Settings Cache Settings Proxy Settings Advanced Settings Help Configuration Aliases Error Files Logging Redirects URL Rewriting Virtual Host Defaults
92. ke this www www your domain com www your domain com www your domain com www your domain com www your domain com your domain com If a trailing dot is omitted on an entry that contains the full domain name the host record ends up with an extra copy of the domain name appended this won t work correctly Enter the new Hostname in the Name field and an IP Address in the Internet dot notation for example 192 83 246 73 for the IP address Select the Save button to submit the new Host Name information The new information will be updated in the Primary Zone s records and will be presented in the Zone Table for this Zone 6 5 18 2 Deleting a Host To delete a host from the DNS Settings page select the zone containing the host you wish to delete From the Zone page empty the Name field for the unwanted host record Click the Save button to see the changes 6 5 18 3 Modifying a Host Record If a host record needs to be changed click on the Hostname in the Zone page and modify as desired The page is the same one as is displayed for creating a new Zone Click Save when you have finished 6 5 PRIMARY ZONES 37 6 5 18 4 Adding Load Balancing Hosts It may useful for busy web servers to spread the load among two or more machines This can be done by adding IP Addresses to a Host Name record your domain com 192 168 1 1 A A e PI vour domain com 192 168 1 The DNS server will load share re
93. l of Service or resource consumption attacks 7 3 9 Allow Root FTP Login Normally proftpd disallows root logins under any circumstance If a client attempts to login as root using the correct password a special security message is sent to syslog When the Allow Root FTP Login directive is turned On the root user may authenticate just as any other user could assuming no other access control measures deny access however the root login security messag is still written to the system log Obviously extreme care should be taken when using this directive 7 3 10 Encrypted File Transfers FTP TLS SSL The iTools 9 FTP server proFTPD utilizes an encryption layer called TLS Transport Layer Security TLS is very similar to SSL only more secure A toggle switch on the FTP Administration Page invokes the TLS directives in the proftpd conf file 7 3 11 Enable TLS SSL Operation OFF Unless you are absolutely certain that every person who will be using FTP on your server has a TLS capable client you should not change this It is a system wide switch FTP TLS cannot be invoked on a user per user basis The default ON setting allows unsigned certificates and all proFTPD ciphers These defaults may be changed directly in the proftpd conf file 50 CHAPTER 7 FTP 7 4 Additional FTP Capabilities The iTools FTP server proftpd has capabilities beyond those that are pre sented in the user interface provided by the Tools Administration
94. ll be applied to all new virtual hosts 17 1 3 Adding Virtual Hosts Click the Add button to enter additional virtual host names Simply type the new virtual host name into the empty text edit field below Server Name Select an IP Address or specify one in the text field Click on the Add Virtual Host button to submit your new virtual host entry The new Hostname must be properly configured with your Domain Name Server DNS and IP address from Network Settings before the virtual host becomes active Each virtual host has a Virtual Host Configuration section These sections are accessible via the Configuration button 17 1 4 Arrange Virtual Host Priority Order When a client is contacting the web server using an IP address instead of the virtual host name the web server has to determine which virtual host to serve to the web browser When multiple virtual hosts are using the same IP address the server will choose the virtual host that has the highest priority to serve The virtual host at the top of the list has the highest priority Select Arrange Order to change the Virtual Host priority Clicking Up and Down changes the serving order of the virtual host Virtual Hosts Access Controls MIME Settings Cache Settings Proxy Settings Advanced Settings Help 17 1 5 Virtual Host Configuration When a virtual host is added to the Tools configuration the Tools Administration Server sets up an initial Vir
95. ll be rarely used 13 2 Configure Firewall Filters A firewall implements a strict set of rules to allow or deny certain connections to or from your computer Without a firewall any connection to your computer is allowed The firewall software is part of the Mac OS X operating system and by default lets everything through which means it is as if you had no firewall Configuring your firewall means adding rules to permit only certain connections The approach taken here is to explicitly allow only certain connections to and from your computer while blocking everything else This is by far the most secure configuration 13 2 CONFIGURE FIREWALL FILTERS 67 Tools Firewall interface allows you to filter on protocols ports or IP address It gives you control via any browser over elements that would otherwise require UNIX command line access Main Menu Network Settings Firewall Settings Help New Rule 00001 deny tcp from 192 168 1 100 to 0 0 0 0 25 00002 deny tcp from 0 0 0 0 to 192 168 1 1 80 00003 deny udp from 192 168 1 1 to 0 0 0 0 53 00004 allow udp from 192 168 1 1 to 192 168 1 4 53 In the list of Firewall rules the left most column is the firewall rule number followed by policy of the rule protocol and source and destination of the rule Selecting any rule will bring up the details about that particular firewall rule The firewall rule number is the look up order of the rules The smallest number means the rule is
96. min Members of this group are permitted access to all the iTools administration pages and may make changes to the iTools configuration including adding and deleting users and groups If the iToolsAdmin group is deleted or if this group is empty access to the iTools Administration Server is completely cut off In this case use the Admin menu item in the iTools application and follow the instructions to add an initial user to this special iToolsAdmin group 16 4 Tools Sub Administration To take advantage of the sub administrator features of iTools 8 you simply need to create a user or group in Tools and grant them access to certain parts of iTools Once the user has been created in iTools you can go to the page that you want that user to have access to and click on the little lock icon for restricting access to that page 84 This will bring up a screen where you can select which users have access to that page Select Me users that can manage beta tenan com 80 ToohAdrin After granting access to the portions of Tools allowed for that particular user close your browser and head back to your Tools Admin This time instead of logging in as admin login as the user you created above Now instead of seeing all of the icons that you would normally see you will only see the subset that this user has access to iTools Administration Server 9 0 2i System Wide Configuration for testing tenon com a
97. n com Refresh Expire Retry Time To Live Authoritative Name Server Hostmaster Domain or Sub domain Hostname Type pss bo pb Jon boo pb j os Domain or Sub domain Hostname Type Priority vx poo br om bo pb nm Name IP Address or Alias Type ECTS ESOS hs E Main Menu Primary Zone Secondary Zone Reverse Zone Help Zone Name Refresh expire Retry a Authoritative Name Server Hostmaster Domain or Sub domain Hostname Type Ns Cc fC ss LT LT 7 Ns IP Node Hostname Type bra AS O mm po 7 po 7 PTR fT PTR CHAPTER 3 ITOOLS QUICK START IMPORTANT This form displays a few text fields where you configure the Start of Authority record SOA The Start of Authority record stipulates time intervals for your DNS refresh retry expire and time to live TTL parameters iTools will automatically try to fill in the information for you if fields are left empty Refresh Retry Expire Time To Live It is very important to enter correct information in this section Enter the authoritative name server for this zone in most cases that will be the primary DNS server for the domain Enter the email address for the contact person for the DNS records or websites Note The sign in the email address should be replaced by a and the domain name followed by a The default value for Refresh Retry Expire and Time to live should be fine in most cases In this example the values entered are
98. nt the zone name from getting appended to it Save the Name Server record by clicking the Save button Repeat the process to add all of the name servers associated with this zone 6 5 16 Domain Name This entry should generally be the same as the zone name unless you wish to delegate a sub domain with in your Primary Zone Entering marketing company1 com here would delegate all requests for any hosts in the marketing company1 com domain to the server listed under Hostname 6 5 17 Host Name The name entered should correspond to a host name listed on a DNS server somewhere 6 5 18 Host Name A Records 6 5 18 1 Adding a Host The New Zone page is accessed by selecting the New Zone entry in the Primary Zone page This page is used to enter the Host Name of a domain to be included in this Zone its IP Addresses and the optional Machine Name 36 CHAPTER 6 DNS and Systems Name information Host records are called A records in BIND terminology Name IP Address or Alias Type ftp apollo CNAME www apollo CNAME your domain com 127 0 0 1 A localhost 127 0 0 1 A a apollo 127 0 0 1 A ke mail 127 0 0 1 A 8 Each host name and alias must be unique within the zone When adding new hosts it is not necessary to append the Domain Name at the end of the Host Name iTools automatically expands them However if you do enter the domain name portion you need to add a trailing period Host entries expand li
99. o place a trailing dot at the end of the server name if it includes a domain name The Hostmaster value is an E mail address for the person who should be contacted in the event of a problem Instead of sign used in the normal email address field the sign should be replaced by a These values also maybe changed later by modifying the Start of Authority table For details on making these changes and for definitions of all of the Start of Authority values please see section 6 5 6 Start of Authority on page 33 Select the Save button to submit the New Primary Zone information The new Primary Zone name will now be included in alphabetical order in the table of Primary Zones in the DNS Settings page 6 5 5 Configuring Entries for a Zone The primary DNS Settings page shows currently configured primary this DNS server To access the Primary Zone page to edit entries for a particular zone click on the Primary Zone name The Primary Zone page displays Host Names and aliases sorted alphabeti cally that are currently in this Zone Each row of the zone table shows the Host Name its IP Addresses Alias Mail Exchangers or Name Servers To change the information about an entry in the table replace the text field with DNS information specific to each row Primary Zones will have DNS records of a number of types e Start of Authority SOA records e Name Server NS records e A Host Name to IP Address mapping A records e An Al
100. on gura tion button beside the virtual host you wish to delete Select the Delete Virtual Host check box at the bottom of the Virtual Host Configuration table Click on the Save button to submit the changes The browser will return to the Tools Administration Server home page and the Virtual Hosts Table should no longer contain the deleted host name The DEFAULT virtual host the one with the same virtual host name as the fully qualified domain name of the machine running the web server does not have the Delete Virtual Host check box because it cannot be deleted 17 1 17 Aliases Virtual Hosts Access Controls MIME Settings Cache Settings Proxy Settings Advanced Settings Help Configuration Aliases Error Files Logging Redirects URL Rewriting Alias Settings For DEFAULT There is a link at the top of each of the Virtual Host Configuration tables that allows you to access the Aliases for the corresponding virtual host or the default aliases for all virtual hosts Aliases specify components of URLs that are aliased or mapped to different directories When a request is received with a URL that contains one of the aliases the data returned to the client comes from the specified directory or file Aliases may also specify a target directory that contains CGIs or scripts rather than normal data In this case the alias is referred to as a ScriptAlias and is represented in the Alias Settings table using a checkbox
101. on properly All HTML files and images need to be readable by others The setting for this is rw r r readable by User Group and World and writable by User and is set automatically when you upload files All folders need to be executable by others The setting for this is rwxr xr x readable by User Group and World writable by User executable by User Group and World and is set automatically when you create a folder All CGI files all files in the cgi bin folder need to be executable by other The setting for this is rwxr xr x readable by User Group and World writable by User executable by User Group and World and is not set automatically when you upload files You need to change file permissions manually Warning It is important that none of your files or folders are writable by anyone else Any file or folder which is writable by others can be erased by them Generally there is no problem just be careful how you set your permissions To change file or folder permissions 8 3 CHANGING FILE FOLDER PERMISSIONS Navigate to the file or folder that you need to change Click on the name of the file or folder Click on the pull down menus for changing Owner Flags Group Flags or Other Flags The permission will update automatically 53 CHAPTER 8 FILE MANAGER 9 Tools Settings Tools configuration settings are global When the automatic restart option is checked a particular service e g Apache will r
102. or IP addresses in the allow and deny fields If you wish to use domain names HostnameLookups must be enabled either globally in the Default virtual host or in the Virtual Host Configuration for this specific host Because enabling DNS lookups negatively impacts server performance this isn t recommended Using IP numbers is the preferred method A range of IP addresses may be specified for a specific subnet by append ing a slash and the number of bits in the subnet mask For example specifying 192 30 20 128 25 would mean all IP addresses from 192 30 20 128 to 192 30 20 255 inclusive Specifying 192 30 20 0 24 would include all addresses in the 192 30 20 class Initially all files and folders are set to No Restrictions There are two options for the order in which rules are interpreted and what occurs in the event that rules contradict each other Examples of their uses include 1 Perhaps your web server is for a small company and some documents are for internal use only You would like to restrict access to these files so that the only browsers that can access them are from the 6 computers on the local network For this you would choose Allow then Deny and in the allow box you would enter the IP address of each machine on the local network Browsers attempting to connect from any other IP number would get the 403 Forbidden page returned 2 A specific client seems to be making a huge number of requests in a very
103. outside locations you will need to open those ports to have access to Tools administration functions The secure administration uses a self signed certificate Naturally for uses other than Tools administration you will want to purchase an official certificate from a valid certification authority For new installations the default login and password is admin To change the password go to the Users Settings page select the admin user and enter a new password for the admin user You may also add additional users to the iTools admin group Users in the iTools Admin group are used only by Tenon s iTools The admin password need not exist in the system password database nor does Tenon s iTools enter it into the system password database Creating other users and additional groups will be covered in a subsequent section Note admin is a very special user and has certain privileges that other users will not have 2 7 CONNECTING TO THE ADMINISTRATION SERVER iTools Administration Server 9 0 2i System Wide Configuration for testing tenon com n 2 E SV Ne Tools Settings Cron Job Settings DNS Settings FTP Settings Y G ge q J p E Se ME n Flle Manager Help License Information Mall Settings a a MySQL Database Settings Network Settings System Status System Update l as Traffic Monitor User Settings Web Settings AF Tenon s iTools license can be entered or changed in the License Informat
104. pth information on what the forms do 24 CHAPTER 4 ITOOLS ADMINISTRATION SERVER Tools Administration Server 9 0 2 System Wide Configuration for testing tenon com at NY ta SA Toes Stns ONS Setmngs FTP Sectings ye CNS IS Mat Serra MYSQL Detabase Sers Network Sethiecs Sytem Satas Sytem pay A a3 PA MAA 4 5 2 iTools Settings The iTools Settings contains configuration settings that are global to iTools Administration Server The administrator can choose to restart services man ually after all the settings are configured properly in Tools Administration Server This is handy if you plan to make a lot of changes and only want to restart the server after all changes have been made 4 5 SYSTEM WIDE CONFIGURATION AT A GLANCE 25 4 5 3 Cron Job Settings The Cron Job Settings section contains configuration settings for scheduling tasks Details on Cron Job Settings are provided in Chapter 5 Cron Job Settings 4 5 4 DNS Settings The DNS Settings section contains configuration settings for Tenon s iTools built in domain name server Details on DNS settings are provided in Chapter 6 DNS 4 5 5 FTP Settings The FTP Settings section contains configuration options for Tenon s iTools file transfer protocol server Details on the FTP settings can be found in Chapter Li ETP 4 5 6 License Information The License Information section contains your registered license information for iTools 9
105. r example tr nr nn lt original certificate crt gt clean certificate crt Replace your certificate with the new clean certificate file and your SSL enabled website should work correctly 17 2 5 6 2 The issuer is Unknown Some Certificate Authority credentials are not included in the bundled Cer tificate Authority Credential file You can obtain the credential from your Certificate Authority and append the credential to Library Tenon WebServer Configuration ssl crt ca bundle crt Restart the web server and the settings will become effective immediately 17 3 Access Controls 17 3 1 Using Access Controls The Access Controls settings can be set for the entire virtual host a partic ular folder or an individual file Sub folders and files within folders inherit the access settings of the parent folder unless they have individual settings specifically assigned 108 CHAPTER 17 WEB SETTINGS Main Menu Virtual Posts Access Controls MIME Settings Cache Settings Proxy Settings Advanced Settings Help Access Cortrocls For Library Tenon WebSerwer WebSites mec your demain com Realm Based Restrictions Domain Mama Based Restrictions Realm Mame gt Mo Restrictions Only those hosts which appears on the allow list and de not appear on the deny hat are granted access This ordering has the sane effect as Allow then Dery and is deprecated in favor of that configuration Allow any Tool
106. r Tenon s iTools system is named www your domain com the URL to connect to the Administration Server would be https www your domain com 85 or http www your domain com 84 4 2 Administration Server Access Access to the Tools Administration Server is restricted to users in the i ToolsAdmin group At installation a default Tools administration 21 22 CHAPTER 4 ITOOLS ADMINISTRATION SERVER user is created with a user name of admin and password admin For security it is strongly advised that you change this immediately after installation To change the admin password go to the Users Settings page and enter a new password for the admin user You may also add new users to the Tools admin group but you need to keep admin as the primary user because admin has special privileges Additional users may be added to the iToolsAdmin group by using Users and Groups tables accessible from within the Tools Administration Server gt User Settings page see Chapter 16 Users amp Groups 4 3 Navigating the Administration Pages The Tools administration pages use HTML forms and Perl scripting to present the web server s configuration information in tables that are easy to read and easy to modify How the information is displayed depends on the type of permissible entries Related entries are grouped together Lists are sorted alphabetically Default or system wide entries are displayed in the
107. r and enter a precedence value for this MX record The mail exchanger may be another host in this zone or another zone Domain or Sub domain Hostname Type Priority your domain com mail Mx 20 ES Mx For a host within the zone the Hostname is sufficient you don t need to include the domain name If the host is outside the current zone be sure to use a fully qualified Hostname and add the trailing dot to the name Select the Save button after configuration The new mail server record s will be displayed for this host when you view the primary zone page or when you view the mail exchangers page specifically for this host Host names that have Mail Exchanger or Name Server records pointed to them must have Host Name records listed in the Primary Zone rather than alias records 6 5 20 2 Deleting Mail Exchangers To delete Mail Exchangers for this Host Empty out the existing Mail Ex change record and select Save button to save the changes 6 5 21 Adding an SPF Record Sender Policy Framework SPF is one of the new technologies in the war against SPAM Soon major carriers like AOL will begin to require SPF records The SPF lookup uses DNS to verify that the sending mail server is valid for the domain of your email address The SPF record must specify the valid mail servers for your domain You can use an SPF wizard on the internet to generate the syntax of the SPF record for example http spf pobox com wizard html
108. rmat The time in the form given by format which should be in strftime 3 format potentially localized Remote user from auth may be bogus if return status s is 401 5 The URL path requested not including any query string The canonical ServerName of the server serving the request setting Connection status when response is completed X connection aborted before response is completed connection may be kept alive after the response is sent connection will be closed after the response is sent zero You need to enable mod_logio to use this enable mod_logio to use this The can be nothing at all e g h u Yr s b or it can indicate conditions for inclusion of the item which will cause it to be replaced with if the condition is not met Each Log Format is assigned to a unique nickname and Custom Log will use the nickname to refer to the Log Format Tied m amp in Tone lo Wied Toile Zo q AE i A szt V t o T O U a o V 0 1 Guo O 98 CHAPTER 17 WEB SETTINGS 17 1 VIRTUAL HOST 17 1 20 Redirects There is a link at the top of each of the Virtual Host Configuration panel that allows you to access the Redirects for the corresponding virtual host or the default redirects for all virtual hosts Main Menu Virtual Hosts Access Controls MIME Settings Cache Settings Proxy Settings Advanced Settings Help Configuration Aliases Error F
109. rols which directory will be used as the root directory folder for this virtual host s content When a new virtual host is added a directory with the same name as the virtual host is automatically created within the WebSites directory The Document Root entry is set to the name of this directory Place the content files to be published for this virtual host in this direc tory If Document Root is not set the default Document Root setting from the DEFAULT virtual host will be used If you have three virtual hosts configured www some domain com www your domain com and your domain net the following directories folders will be created Library Tenon WebServer WebSites www some domain com Library Tenon WebServer WebSites www your domain com Library Tenon WebServer WebSites your domain net If you change the name of the virtual host s directory or decide to use some other directory make the corresponding change to the Document Root setting for this virtual host In the above example www your domain com and your domain net might actually be the same web site in that case you would place all content in a single folder and would need to make sure the Document Root for each host pointed to the correct directory containing that site s content 17 1 9 Server Admin The Server Admin setting is an email address This address is included in messages sent to a browser whenever a web server error occurs Users
110. s The name of the file or directory to which these settings apply appears at the top of the table This is a valid URL to this specific file or directory complete with the proper virtual host name Clicking on this URL will make a request to the Web server in the exact same manner as any client web browser Thus this link provides not only an explicit reference to the file or directory to which the Access Controls apply but also provides an easy way to test the settings 17 3 2 Browsing Contents Each entry in the Virtual Hosts Table has a button for Folder Contents The Browsing Contents table provides a means for finding any file or sub directory within a virtual host s hierarchy 17 3 ACCESS CONTROLS 109 Main Menu Virtual Hosts Access Controls MIME Settings Cache Settings Proxy Settings Advanced Settings Help Access Controls Choose or npecty path or URL for which to apply access controls Library Tenon WebServer WebSites mac your domain com 1 F Select Ubeary Tenon WebServer WebSites Browse Clicking this button takes you to the Browsing Contents table which contains an entry for each file and sub directory contained in the Document Root of the virtual host in question To display the Browsing Contents table with the contents of a specific sub directory simply click on that sub directory s name in the Browsing Contents table The Browsing Contents table provides a means for finding an
111. s CGIs that rely on sendmail and Post Office is FREE for 5 mail accounts or less so you can use the FREE Post Office to support webforms and scripts Please refer to Post Office Administration Manual for Post Office mail administration 12 Traffic Monitor Traffic Monitor provides non stop monitoring of your server and all its key elements When there is a problem you will be the first to know so you can begin trouble shooting before your customers call you You will be able to evaluate your web site performance from your customer s perspective and optimize it to improve customer satisfaction 12 1 Web Traffic Monitor The Web Traffic Monitor will plot the number of http requests in the most recent five minutes The intervals are sampled every 10 seconds The Web Traffic monitor will keep up to four different monitor connections alive therefore you should always subtract four from the number of requests to your website 12 2 FIP Traffic Monitor The FTP Traffic Monitor will plot the number of FTP requests in the most recent five minutes The intervals are sampled every 10 seconds 12 3 Mail Traffic Monitor The Mail Traffic Monitor will plot the number of FTP requests in the most recent five minutes The intervals are sampled every 10 seconds 63 CHAPTER 12 TRAFFIC MONITOR 13 Network The Network Settings panel provides network card management and firewall management Network Settings lets you configure your network car
112. s server e 17 4 4 Mime Languages Main Menu Vetwal Hosts Access Controls MIME Settings Cache Settings Proxy Settings Advanced Settings Help Actions Handlers Built In Extensions Custom Extensions Language Encoding Languages Lote 5 age S t 1 Catalan C 3 de German Ab Danish 4 el reek l Ls en English Esperanto The MIME Languages table provides a means for mapping a file name by its extension to a language The web server takes no special action based on the language but the given language is passed back to the client in the HTTP header for any specific interpretation in the browser 118 CHAPTER 17 WEB SETTINGS Virtual Hosts Access Controls MIME Settmgs Cache Settings Proxy Settings Advanced Settings Help Actions Handlers Built In Extensions Custom Extensions Language Encoding MIME Encodings Extensions To map anew file name extension to a language enter the extension in the empty text edit field in the first row of the table and select a language from the pop up list The Priority sets the precedence of language variants for the case where the client does not express a preference when handling a MultiViews request Note that this directive only has an e ect if a best language cannot be determined by any other means Correctly implemented HTTP 1 1 requests will mean this directive has no effect Then click Save to submit the new setting To change an exi
113. s the number of requests that can be pro cessed simultaneously If the Max Clients are concurrently in progress sub sequent requests are not necessarily lost Instead they are queued until an existing request has completed 17 7 4 Max Spare Threads The Max Spare Threads setting controls the number of idle i e not cur rently servicing any request web server processes If the number of idle pro cesses exceeds this number the excess processes are terminated 17 7 5 Min Spare Threads The Min Spare Threads setting controls the number of idle i e not currently servicing any request web server processes If the number of idle processes is smaller than this number extra web server processes are instantiated at a rate of one per second 17 7 6 Max Requests Per Child The Max Requests Per Child setting controls the number of requests each web server process will service web server processes service one request at a time However upon completing one request they may begin servicing another Increasing the number of requests each web server process services reduces the overhead of instantiating and terminating web server processes Restricting this number reduces the likelihood of accidental loss of system resources as these resources are recovered when a process exits Also the dynamic control over the number of currently running processes responds to a reduction in load by allowing some web server processes to exit without instant
114. s user s to login Allow Then Deny The Allow bat ere ewalulated before the deny bat Access ii Y Allow selected user s to login denied by default Any client which does not match in the allow list or does match in a deny brt will be denied accor to the server Allow user s in selected group s to login Deny Then Allow The deny 111 are ewalueted before the alow het Access is allowed by defeuk Any chert which does not match in the deny list or does match im the allow list will be allowed eccess to the server Users Grouper Allow Lict Deny Ust admin ToohAdmrun subadminl myGrowp The user acera Pus location must sabefy Beth domen bared restriction AND realm bared restriction D Eher domain based restriction OR resim based restriction Options Web Oav Enable WebOayv CA Execute CG Scripts _ Read Only access for anoeymous users MIME Type Ovemdes Do Mot Follow Syrmink Follow Syrnvinks gt none e Follow Symlinks IF Owner Matches Wo Server Side Incudesr Action Handler Overides Server Side Includes none Server ide Indude No Exec Allow Options Override Display Indexes pray Allow use of access file to override web server configuration for this Mutiviews Content Negotiation directory and fa awb diractorias Included in the Access Controls section are settings for Domain Name Based Restrictions MIME Type Overrides MIME Type Overrides Action Handler Overrides and Option
115. satisfy each request and thus increase the load on your server However without Hostname Lookups Access Controls can be based only on IP addresses not on host names or domain names If Hostname Lookups is disabled IP addresses will be used in the Apache access logs but these addresses can subsequently be resolved into host names by your log analysis software 17 1 14 SSL Certificate File The SSL Certificate File is the name of the SSL server certificate for an IP based virtual server Individual SSL certificates require unique IP numbers but host header based virtual hosts can share the same server certificate Multiple IP based hosts may also share a single wildcard certificate This setting allows certificate wildcarding among several IP hosts See Section 17 2 SSL for more information 17 1 VIRTUAL HOST 93 17 1 15 SSL Certificate Key File The SSL Certificate Key file is the private key associated with the server certificate Keys generated by Tools during certificate signing request generation are normally stored in a secure area of the iTools internal file system however this field may be used for private keys of wildcard certificates or when a certificate and key are imported from another system Server certificates are stored in the directory Library Tenon WebServer Configuration ssl crt 17 1 16 Deleting Virtual Hosts To delete virtual hosts from the Virtual Hosts Table click on the C
116. se or display it as is or if a helper application is required The server uses the file suffix and a table that maps file suffixes file extensions to specific MIME types to determine what MIME type to include in the header Sometimes users will upload files that have an inappropriate suffix or you have files that were not created to be served on the web and might lack a suffix altogether It can be problematic to get these kinds of files correctly displayed this is where the MIME type Overrides can be helpful For example if you have an entire folder of images in GIF format you can set that folder to assign the MIME type of image gif to all files served from that folder regardless of filename or suffix Files or folders without explicit MIME type overrides will inherit the settings of their parent folder directory and the Inherited indicator will be displayed along with the inherited setting See Section 17 4 for more information about MIMI settings 17 3 11 Action Handler Overrides Action Handler Overrides allow a specific file or folder of files to be passed to a designated action handlers for processing before the file is served This Action Handler Overrides none 17 4 MIME 115 overrides the defined action for the files based on suffix file extension and the associated MIME types For example this would allow you to have a set of files with a filename extension of html to have SSI processing without having
117. ser tracking using Cookies replacement for mod_cookies A 10 Miscellaneous Mod_imap The image map file handler Mod_proxy Caching proxy abilities Mod_mmap static Experimental file caching mapping files into memory to improve performance Mod_dav Provides DAV support A 11 Encryption Mod ssl Secure Socket Layers w 128 bit encryption
118. short time and it s causing problems with excess traffic on your server You are able to determine the IP address of the machine which is making the requests You would choose Deny then Allow and enter the IP address of the o ending client in the deny box This would block access from that machine but allow everyone else In the case that you experience a distributed DOS attack you will want to block it further upstream at your router and have your upstream Internet provider block the attack as well For more advanced restrictions the general rules are Evaluation Selection Evaluation Order No Restrictions All requests are permitted Allow then Deny The Allow specifications are evaluated first followed by the Deny specifications If any Deny contradicts any Allow the Deny takes precedence Deny then Allow The Deny specifications are evaluated first followed by the Allow specifications If any Allow contradicts any Deny the Allow takes precedence CHAPTER 17 WEB SETTINGS 17 3 10 MIME Type Overrides MIME Type Overrides allow selected files or folder of files to be served with a user defined MIME type rather than what would be assigned as the MIME type based on the filename extension suffix MIME Type Overrides none The server includes the MIME type in the header it sends to the browser for each file The browser uses that information to determine what type of file it is and whether the browser itself can par
119. solver requests to this Host equally among the IP Addresses entered Enter one IP Address per line The machines do not have to be part of the same network 6 5 19 Alias Records Aliases are records that refer to other Host Name records or aliases You should not enter an IP Address in an alias record Host Name records should be used if you are pointing a Hostname at an IP address Alias records are also known as CNAME records or Canonical Name records 6 5 19 1 Adding an Alias The new Alias is set by selecting the CNAME from the Type pull down menu on the Primary Zone Page and filling out the name of the configured Host corresponding to the nickname Enter the new Alias Name The new alias name must be unique within this Zone i e it must be different than any other Host Name or alias in this Zone It is not necessary to append the Domain Name at the end of the alias name in other words it is not necessary to enter fully qualified Host Names If the Domain Name is appended either with or without a trailing dot the Domain Name will be stripped off and the abbreviated form will be used in the database and in the presented tables If the entered Host Name is not in this Zone it is necessary to enter a fully qualified Host Name including the dots and a trailing dot Select the Save button to submit the new alias name information The new information will be updated in the Primary Zone s records and will be presented in
120. sting setting either modify the extension in the text edit field or select a new language from the pop up list change Language Priority from the pull down list Then click Save to submit the changes 17 4 5 Mime Encodings The MIME Encodings table provides a means for mapping a file name by its extension to a MIME encoding The Web server takes no special action based on the encoding but the given encoding is passed back to the client in the HTTP header for any specific interpretation in the browser To map a new file name extension to an encoding enter the extension in the empty Extension text field in the last row of the table and enter an encoding in the Encoding text field Then click Save to submit the new setting To change an existing setting modify the extension or the encoding its respective text edit field Then click Save to submit the changes 17 5 Cache 17 5 1 Cache Settings Clicking the Cache Settings link reveals the Cache Settings tables The Cache Settings tables contains options that control the Tools Accelerator Cache This cache is object based and keeps the most recently accessed web pages in memory making these pages immediately accessible for subsequent requests 17 5 CACHE 119 Main Menu Virtual Hosts Access Controls MIME Settings Cache Setungs Proxy Settings Advanced Settings Help Cache Setting Accelerator Cache On Ignore Cache Control on Default xpire seconds Ma
121. stname gt port Here are some example entries in the Remote Proxies table http goodguys com http mirrorguys com 8000 http cleversite com ftp http ftpproxy mydomain com 8080 In the last example the proxy will forward FTP requests encapsulated as yet another HTTP proxy request to another proxy which will then handle them as FTP requests 17 6 11 ProxyPass The ProxyPass setting allows remote servers to be mapped into the space of the local server The local server does not act as a proxy in the conventional sense but appears to be a mirror of the remote server Each line in the ProxyPass text edit field defines a local url and a remote server These fields are separated by a space character The local url is the name of a local virtual path The remote server is the URL for the remote server Suppose the local server has address http wibble org Typing the following mirror foo http foo com will cause a local request for http wibble org mirror foo bar to be internally converted into a proxy request to http foo com bar 17 6 PROXY SETTINGS 125 17 6 12 Proxy Access The Proxy Access settings control two things The Domain Name Restric tions control which hosts may use this iTools server as a proxy server The ProxyBlock acts as a censor list by restricting access to certain URLs such as pornographic material Virtual Hosts Access Controls MIME Settings
122. talled will take the user to the Post Office administration screen Clicking on the Mail Settings button in the Administration Server home page will bring up the Mail Settings screens Note that a mail server is not part of iTools but that the Mail Settings screen is just a convenience to allow minimal configuration of the mail server that came with whatever version of Mac OS X you are running 11 1 Sendmail Postfix Configuration 11 1 1 Local Host Names The Local Host Names table should contain an enabled entry for every Host name that the mail server should accept mail for These host names correspond to the part after the sign in an email address Main Menu Local Host Names Relay Domains Virutal Users Mail Aliases Help Local Host Narros Mail domains to be handled exdurively by tis hort Status i Horst namer ensbled disabled Y apollo tenon com Add Hart Click the lod to restrict access Enabled entries are added automatically for any virtual host added in the Virtual Host Configuration table iTools will not automatically enable entries for a domain name added as a virtual host in order to avoid conflicting with established mail servers To manually add a host name enter it into the Add Host field at the bottom of the table The host name will be enabled by default but can be disabled 59 60 CHAPTER 11 MAIL SETTINGS by unchecking the Status check box Host names should be disabled if other
123. te or those URLs ending with a trailing Examples http your domain com http your domain com support Requests not ending in a for example http your domain support re sult in the server attempting to locate a file by the name support in this example When the server fails to find a file by that name it does an internal redirect changing the URL to add the trailing slash and attempts to locate a directory folder by that name instead When such a request is made the Directory Index filename is added to the end of the URL pointing the client request to a default file or CGI for that directory In iTools the default index filenames are index html and default html Additional index filenames can be added to the list with a space entered between each This list is searched in order from left to right for a file with the corresponding name in the directory Other Macintosh servers use default html while the typical Apache setting is index html The Tools default is chosen to accommodate the Mac OS X web master in transition to Mac OS X If the Directory Index field is left empty the contents of the directory will be listed on the returned page 17 1 13 Hostname Lookups The Hostname Lookups setting controls whether reverse DNS lookups are performed for each incoming request using the originator s IP address Enabling Hostname Lookups will generally increase the time necessary to
124. the certificate to xxxxxx crt where lt xxxxxx gt is the name of the virtual host for which the certificate was generated and place the official certificate in the folder Library Tenon WebServer Configuration ssl crt The official certificate will replace the temporary self signed certificate gen erated by Tools for use prior to receipt of the official certificate Each SSL Certificate that was produced during the creation of the CSR works in conjunction with the SSL Key file located in Library Tenon WebServer Configuration ssl keys If the SSL Certificate file is lost you may be able to request it again at some expense from the Certificate Authority If the SSL Key file is lost the SSL Certificate is useless and a new certificate will need to be issued See section Safeguarding SSL Keys And Certs on pagel06 for tips on how to prevent this from occurring 17 2 59L 103 17 2 4 SSL Settings To generate an SSL certificate click on the Edit Certificate button beside the SSLSecurity entry in the Virtual Host Configuration table The SSL Settings page is a form for generating a Certificate Signing Request CSR Main Menu Help Configuration Aliases Error Files Logging Redirects URL Rewriting SSL Settings For mac yourdomain com Common Mame mec your dor om cor Organization Name Tenon Imersystems Orgarizational Unit Online Store Locality Samta Barbara Califorma Courty Co
125. the data for adding and configuring iTools users It is accessible by clicking the User Settings from the iTools Admin Server home page Main Menu Users Settings Groups Settings Help New User admin Ltrs 16 2 1 Adding Users To enter a new user name and password type the user name into the empty text field in the first row of the table in the Name row Type a corresponding password into the second text edit field The password will not be displayed as it is typed Instead bullet characters will be displayed so type carefully Click the Save button to submit the new user name and password You will have to save after adding each new user before moving on to the next one you wish to add For each user check the boxes for FTP if you wish to enable FTP A user without FTP checked would have web page access only Click on the FTP checkbox to enable FTP access for this user If FTP access is enabled select an FTP Home for this user The FTP Home is the directory that this user will be given access to when they FTP into iTools When logging in via FTP users will be placed directly into their de ned root directory folder They will have access to that folder and all sub folders within it They will not be able to move to a higher parent directory above their root directory Using the pop up menu FTP user s root folder can be set to e Restricted to access only a particular virtual hosts root folder var www e The anon
126. thoritative Name Server The Authoritative Name Server value should contain the name of the pri mary master Name Server for this zone This server that is the best source for the data contained within the zone This field usually corresponds to a Name Server host that was registered when you bought your domain The name should usually be a host name that resolves to the IP address of your Tools server For this field be sure to place a trailing dot at the end of the server name if it includes a domain name 6 5 12 Hostmaster The Hostmaster value is an E mail address for the person who should be contacted in the event of a problem with information contained in this zone The sign is replaced by a 6 5 13 Name Servers Registrars require that you provide two name servers for each domain being registered Every primary zone should have also have a minimum of two name servers associated with it more are allowed It is optimal to have a secondary name server that is on a completely different network than your primary name server If one of the secondary name servers is geographically distant you are provided with additional redundancy in the even that there are Internet problems affecting a widespread area Many people trade DNS services with other people to achieve this Some ISPs provide secondary DNS at a low cost and many nationwide providers have DNS servers placed in geographically dispersed locations 6 5 14 Primary VS S
127. tically places that user in a special FTP user directory Users ftp Anonymous FTP users are thus restricted from accessing any other directories on the system The FTP directory generally contain some default sub directories which pro vide different kinds of access to the anonymous FTP clients The pub directory is the generic placeholder for documents targeted for public consumption Anonymous FTP users can get files from this directory but they cannot put files into this directory or modify any files within this directory Generally the iTools administrator controls the organization 7 2 FTP SETTINGS 47 and contents of this directory However password based FTP users can place files in this directory if their FTP Home directory is either All Tools directories or Anonymous FTP The hidden directory provides a level of security by obscurity Anonymous FTP users cannot list or see any of the files within this directory but if they know the exact name of the file they are looking for they can get that file from this directory A hidden directory is created by using the command makedir dirname to create the specified directory dirname and then the command chmod 511 dirname to set permissions on the directory which will not allow listing of the folder by anyone except the root user The incoming directory provides a place for anonymous FTP users to put files on this server Generally these files are deposited here for consumption
128. to rename the files with a shtml suffix This also allows virtual hosts to have different server side processing of files with the same extension one virtual host could have html files processed by the server while another virtual host could have html files left as is or have them processed by another script Folder or files without an explicit override inherit the settings of their parent folder directory and the Inherited indicator will be displayed along with the inherited setting For more information about action handlers see Section 17 4 MIME 17 3 12 Allow Options Override When this option is not set then htaccess files are completely ignored In this case the server will not even attempt to read htaccess files in the file system When this option is set then any directive which has the htaccess Context is allowed in htaccess files 17 4 MIME 17 4 1 Actions This directive adds an action which will activate cgi script when action type is triggered by the request The cgi script is the URL path to a resource that has been designated as a CGI script using ScriptAlias or AddHandler The action type can be either a handler or a MIME content type It sends the URL and file path of the requested document using the standard CGI PATH INFO and PATH TRANSLATED environment variables PHB OVE aaa CORA E SARA Ad SER St EPR PS Ga pot Virtual Hosts Access Controls MIME Settings Cache Settings Proxy Se
129. totally replace or operate in concert with other DNS servers for your domains This chapter contains basic DNS information and how tos for configuring Tools DNS server The definitive resource for an in depth understanding of DNS is O Reilly amp Associates DNS and BIND 400 pages covering both DNS theory and detailed configuration information for BIND It is important to properly configure DNS entries before adding virtual hosts to your server The DNS server can be your iTools machine another machine on your network DNS provided at another location or from your ISP 29 30 CHAPTER 6 DNS In most cases servers will have static unchanging IP numbers Occasion ally people run servers with dynamic IP allocation Dynamic IP allocation creates significant complications for configuration and is not recommended 6 2 Running Tools With DNS Off If you have disabled DNS BIND in Tools you will need to have another DNS server configured with zone data for the hosts domains you wish to host on your Tools server Be sure that your system has a valid entry for the appropriate DNS server 6 3 Running iTools With DNS On Tools DNS server can be started and stopped from the System Status page of the Tools Administration Server For more details see Chapter 14 System Status It is a good idea to have your system pointed directly to your server s IP address for DNS lookups Details about setting this can be foun
130. ttings Advanced Settings Help Actions Handers Built In Extensions Custom Extensions Language Encoding FIA Aion Type application type map 116 CHAPTER 17 WEB SETTINGS 17 4 2 Handlers Handlers are an entity internal to Apache Files having the name exten sion will be served by the specified handler name This mapping is added to any already in force overriding any mappings that already exist for the same extension For example to activate CGI scripts with the file extension cgi you might use Virtual Hosts Access Controts MIME Settings Cache Settings Proxy Settings Advanced Settings Help Actions Handlers Built In Extensions Custom Extensions Language Encoding Mendlers Assccdated Extensions cy tyipe map var default hander built in handler built in header rnod_info perver tabue built in har dies mod ttattar Once that has been put into your configuration any file containing the cgi extension will be treated as a CGI program The extension argument is case insensitive and can be specified with or without a leading dot 17 4 3 MIME Extensions There are two MIME Extensions tables the Custom Extensions table and th Built In Extensions table Both MIME Extensions tables map a file name by its extension to a MIME type The extension or MIME type is then mapped to one of the action handlers to control what actions should be taken when any file with this extens
131. tual Host Configuration for the new virtual host Initially some of these settings are inherited from the DEFAULT virtual host Each virtual host is assigned a root directory folder which will contain the web pages for that host Browser requests with a URL containing the virtual host name are mapped to the corresponding directory and the index file in the root directory for the host will be served 17 1 VIRTUAL HOST 89 By default Tools automatically creates a new empty directory for each new virtual host created The name of the directory will match the name of the host that has been created This directory is called the document root and is the repository for that virtual host s content The root folder does not need to have the same name as the fully qualified hostname for the virtual host you can call it whatever you like but be sure to enter the correct folder name in the DocumentRoot field The server settings ensure that browser requests for a particular virtual host are directed to the correct root folder for that host and that pages for other hosts won t unintentionally be accessed To access the Virtual Host Configuration table click the Configuration but ton beside the name of the virtual host you wish to configure To change the virtual host settings modify an existing setting or group of settings and click on the Save button Virtual Hosts Access Controls MIME Settings Cache Settings Proxy Settings
132. uld be listed in the Local User field Main Menu Local Host Names Relay Domains Virutal Users Mail Aliases Help Aliases Map hat name to a comma separated list of e mail addresses List Name Addresses r Files itools maillist info sales Ka de Save Click the lock to rertrit access Virtual users can be used in conjunction with Mail Aliases for a very powerful control of your mail server 11 1 4 Mail Aliases Mail Aliases can be used to set up simply mailing lists or for redirecting emails to programs on the server A list of email addresses can be entered in the Addresses or Files field or a path to a file containing a list of e mail addresses can be entered there The List Name field would receive the 62 CHAPTER 11 MAIL SETTINGS name of the fake user that the mail would be sent to Again this user does not need to have a mail account on your server it just represents what email address the list mail would be sent to 11 2 Post Office Configuration If Post Office is installed on the same machine as the iTools then mail administration is forwarded to port 9090 of the same server Tenon recommends Post Office for all mail needs Post Office is a powerful mail server and list sever for Mac OS X with features not available in either sendmail or Postfix All configuration and management is done using a browser based GUI Even though Post Office is a proprietary mail server it seamlessly support
133. user would have full control of the DAV enabled portion of your web server At this time the files that are managed within the WebDAV directory should be read write for the web server process Files and directories that are created by the WebDAV server will have read write exec privileges for the user and group but not the world of the server process and will be owned by the pro cess user group For example if you run your web server as www www then you will want to create a base directory owned by www www and give it read write exec privileges to the user and group 17 3 7 1 Read Only Access for Anonymous Users When this option is enabled the Realm restriction only applies to publish the web folder with WebDAV The anonymous users can still read contents of the web folder without login 17 3 8 Realm Based Restrictions Realm based restrictions to a specified URL are based on user authentication If a client fails to provide a correct user name or password access is denied before setting up a realm itis a good idea to have your initial users and groups 112 CHAPTER 17 WEB SETTINGS Reaim Name Reouire s Any Vald User Selected Users Users in Selected Groups Users GrouDbs admin iToolsAdmin bob Tenon cathy eric janice To set up a realm first choose whether the realm will be based on specific users or groups in the Require checkbox The basis for the realm can be any of the settings defined below Setting
134. ving any data on either the control or data connection If data is received on either connection the idle timer is reset Setting Idle Timeout to 0 disables the idle timer completely clients can stay connected for ever without sending data This is generally a bad idea as a hung TCP connection which is never properly disconnected the remote network may have become disconnected from the Internet etc will cause a child server to never exit at least not for a considerable period of time until manually killed 7 3 ADVANCED FTP SETTINGS 49 7 3 6 No Transfer Timeout The No Transfer Timeout directive configures the maximum number of sec onds a client is allowed to spend connected after authentication without issuing a command which results in creating an active or passive data connection i e sending receiving a file or receiving a directory listing 7 3 7 Stalled Transfer Timeout The Stalled Transfer Timeout directive sets the maximum number of seconds a data connection between the proftpd server and an FTP client can exist but have no actual data transferred i e stalled If the seconds arguments is set to 0 data transfer are allowed to stall indefinitely 7 3 8 Command Buffer Size The Command Buffer Size directive controls the maximum command length permitted to be sent to the server This allows you to effectively control what the longest command the server may accept it and can help protect the server from various Denia
135. vs Systent USES 78 DESP E Oen Enn eeu tetany aen eect ue canes 79 System User Ty DGS oniranran 79 IDES CEU OMI eaaa nn EE sg pe A NA cannes ma radandausiped OEE 79 102 US Sn 80 16 21 Addin US aii 80 1622 Chango a US taa ao eli 81 10 2 DEERING a Useless 81 TG 3 GROUPS assestiins cissttit vacate avis nes E a a a 81 103 Creatina Cr TOU Pida ind 81 10 32 SOCKS 1M TOD ia di 82 16 33 Modifying a Group NaMe seieren 82 16 3 4 The iTools Admin round 82 1641T001S Sub AdminstratiON srta tia 82 EL Web SOCIO ins 85 EA AOS EN O A E tee 85 A HOST Tabien A O 85 ADA ii is AAA vosseaasivaseacanvecoedes 85 15 Addis Virtual POSSE ln 86 17 1 4 Arrange Virtual Host Priority Order ssssaicino aladas 86 115 Vistual Host Cont sta ON 86 AR SOE Ver A ties tea va N R a 87 AZ Mego o A a a 88 LALO Document ROO aa dad 88 FAA E ian i i 88 IO Serve r Alias o a a S 89 LT ever O a eters 89 ALT Directory Index 89 L HOstmame LOOK UPS re a AE T 90 LOSC Cernicate PIE oiana E E N AES 90 VA Nooo RES e Key Ple E E E E E 91 1716 Delete Virtaal Ostia aaa a oS 91 LIZANIE a E N 91 LS Error Ple rrin n e a ee 92 AV TDS INE aaia OO 93 LALA PLEOD LDO stand S 93 LIZ Rotation linea da 93 TZ AAS Custom Loi 94 TEIA SEM O 94 VALLA E FO A ia ies 94 A A teks tans E E E saopueesastaves 96 EZ ZS INC WTI wegner ane E A T 97 k2 IRC Wiile Base DeCS di iin nines ieee tarseaoceds 98 1712122 RewriteCond Die veis 98 TALZ RE WrteLock Die versa rdic 98 17214 Rewrite Map DITecUVe sia rs
136. w of a table which has been left blank by design When new entries are saved the table is re displayed and the new entries appear in their proper place in the table The last row of the table reverts to blank awaiting input of another new entry 4 3 4 Removing Entries Removing an item from a table can be accomplished by one of the following eDeleting any entry which is displayed in a text edit field which should leave that field blank e Unchecking all of the possibilities for a check box eSelecting None from a pop up list or radio button selection The Save button can then be clicked to remove the item The key field to be deleted is in the first column of the listed item 4 4 Inheritance If certain settings for a particular item are not explicitly set they are inher ited from the global settings if the corresponding settings exist or the DE FAULT virtual host In addition to pre set defaults webmasters can also customize a default virtual host See section 17 1 2 for this option Subsequent chapters will include details about each configuration option 4 5 System Wide Configuration at a Glance 4 5 1 System Wide Configuration The System Wide Configuration panel is the starting point for administering iTools it may also be called the Admin Home Page It contains icons for each of the major areas of iTools administration Clicking on a button will present a table with forms for that specific area and links for in de
137. x iTools gives administrators the freedom of anywhere anytime Apache management and lets their clients securely administer their own virtual hosts iTools extends the internet software that ships with Mac OS X and Mac OS X Server and enhances open source packages by augmenting key internet services with a point to click interface to make configuration and maintenance easy and error proof Tenon s iTools GUI and built in functionality has made the transition to Mac OS X an easy step for Macintosh web masters At the same time Tenon s iTools performance combined with Apple s Intel processing power is attracting UNIX and NT web masters to Apple s Mac OS X platform Tenon s iTools includes an Apache 2 2 Web server domain name server DNS and multi homing secure file transfer server FTP Because we know that creating a world class web server involves more than simply being able to deliver content quickly and reliably we ve bundled iTools with a variety of open source web development tools ht Dig Tomcat with SOAP support PHP MySQL These tools are delivered in ready to use separately installable packages They extend iTools with a search engine Java servlet support and Java Server Pages dynamic web page creation tools and SQL databases eCommerce on Mac OS X is supported by iTools SSL 3 0 a PCI compliant Secure Socket Layer to support the secure exchange of data between iTools and any SSL enabled browser Tenon s iTools
138. x fxpve seconds Cache Disable The following parta URL prefixes will not be cached Dish Cache Settings Deck Cache Y Ceche Root a Ceche Ste kilobytes Garbage Collection Interval howls Cate Directory Levels directores Cate Directory Length characters Expry Check or Ez Minirmasn File Size bytes Maurum Fila Este bytes Garbage Collection Max Memory Usage kilobytes Memory Cache Settings After changing the Cache Settings click on the Save button to preserve your changes 17 5 2 Accelerator Cache The AcceleratorCache setting controls whether the memory cache is On or Off The default setting is On Turning the cache to Off will save some memory so this setting might be useful for servers that are running low on memory Turning the cache to Off will also affect the performance of the server 17 5 2 1 Ignore Cache Control The Ignore Cache Control directive instructs Cache Disable to disable Cache specified URLs 17 5 2 2 Default Expire Default Expire is the default time in seconds to cache a document if the page does not have an expiry date in the Expires field 120 CHAPTER 17 WEB SETTINGS 17 5 2 3 Max Expire Max Expire is the maximum time in seconds to cache a document The Max Expire takes precedence over the Expire field from the header 17 5 2 4 Do Not Cache The following partial URL prefixes will not be cached This setting is a list of words or characters A URL containing any of
139. y file or sub directory within a virtual Host s hierarchy This is useful for setting Access Controls on folders or even specific files Browsing Comments of Library Tenon Directories files parches DS Store Pest webmail cord PHP pe og proMyAdmin PHPNuke System Toral Wedi dge Weblog fubrary Tenon Click the lock to rertrt accore The columns in the Browsing Contents table are described in detail below 17 3 3 Directories This column displays an alphabetical list of all sub directories contained within the specified directory When the Folder Contents table is displaying the contents of a directory other than the Document Root directory a Parent Directory link is displayed as the rst entry in the Folders column Clicking on the ParentDirectory link will display the Folder Contents table for the directory in which the current directory resides 110 To make any settings specific to a particular sub directory click on that directory s name to display a Directory Contents table of that directory and then click the Access Controls button 17 3 4 Files This column displays an alphabetical list of all files obtained within the specified directory To access any settings specific to a particular file click on that file s name to display the file s Access Controls information 17 3 5 Access Control Settings There are two main types of Access Controls for folders and files Realm Bas
140. ymous FTP hierarchy home ftp e Access to all of the virtual hosts root folders e All of the iTools directories including the anonymous FTP hierarchy Using the text edit field a path to any valid directory can be entered for this user s FTP root directory If no FTP root directory is set for an individual user the FTP access is disabled Adding a user with FTP enabled creates a FTP only user in the Mac OS X A AF NM AT 1 82 CHAPTER 16 USERS amp GROUPS databases are not changed to FTP only However the system user password and home directory will be synchronized to be the same as defined in the Tools user database be careful when adding FTP users with the same name as a system user Once a user name and password have been entered the new entry will show up in the table in alphabetical order FTP user root directories are shown as paths 16 2 2 Changing a User To change an existing user name modify the password type of access or FTP Home text field edit the relevant entries and click Save to submit the changes 16 2 3 Deleting a User Select the user you wish to delete and click Delete button to submit the changes Under the system user database the username listed for each Tools user is not very informative therefore it is best to add modify and delete Tools users from the Tools Admin Server 16 3 Groups Tools provides a set of realm based access controls that can restrict access to a particular

Download Pdf Manuals

image

Related Search

Related Contents

Targus Fit N’ Grip 7-8”  Epson WF-100 Quick Guide and Warranty  Descargar ficha técnica  Phoenix Gold Speaker TI210D2 User's Manual  Indesit KM B21S(X)/EX cooker  FLiP:mac 2 Brasil - Manual do usuário  Uponor Smatrix Wave  

Copyright © All rights reserved.
Failed to retrieve file