mirror of
https://github.com/apache/httpd.git
synced 2025-08-13 14:40:20 +00:00

git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@1793934 13f79535-47bb-0310-9956-ffa450edef68
530 lines
22 KiB
XML
530 lines
22 KiB
XML
<?xml version="1.0"?>
|
|
<!DOCTYPE modulesynopsis SYSTEM "../style/modulesynopsis.dtd">
|
|
<?xml-stylesheet type="text/xsl" href="../style/manual.en.xsl"?>
|
|
<!-- $LastChangedRevision$ -->
|
|
|
|
<!--
|
|
Licensed to the Apache Software Foundation (ASF) under one or more
|
|
contributor license agreements. See the NOTICE file distributed with
|
|
this work for additional information regarding copyright ownership.
|
|
The ASF licenses this file to You under the Apache License, Version 2.0
|
|
(the "License"); you may not use this file except in compliance with
|
|
the License. You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
-->
|
|
|
|
<modulesynopsis metafile="mod_session.xml.meta">
|
|
|
|
<name>mod_session</name>
|
|
<description>Session support</description>
|
|
<status>Extension</status>
|
|
<sourcefile>mod_session.c</sourcefile>
|
|
<identifier>session_module</identifier>
|
|
<compatibility>Available in Apache 2.3 and later</compatibility>
|
|
|
|
<summary>
|
|
<note type="warning"><title>Warning</title>
|
|
<p>The session modules make use of HTTP cookies, and as such can fall
|
|
victim to Cross Site Scripting attacks, or expose potentially private
|
|
information to clients. Please ensure that the relevant risks have
|
|
been taken into account before enabling the session functionality on
|
|
your server.</p>
|
|
</note>
|
|
|
|
<p>This module provides support for a server wide per user session
|
|
interface. Sessions can be used for keeping track of whether a user
|
|
has been logged in, or for other per user information that should
|
|
be kept available across requests.</p>
|
|
|
|
<p>Sessions may be stored on the server, or may be stored on the
|
|
browser. Sessions may also be optionally encrypted for added security.
|
|
These features are divided into several modules in addition to
|
|
<module>mod_session</module>; <module>mod_session_crypto</module>,
|
|
<module>mod_session_cookie</module> and <module>mod_session_dbd</module>.
|
|
Depending on the server requirements, load the appropriate modules
|
|
into the server (either statically at compile time or dynamically
|
|
via the <directive module="mod_so">LoadModule</directive> directive).</p>
|
|
|
|
<p>Sessions may be manipulated from other modules that depend on the
|
|
session, or the session may be read from and written to using
|
|
environment variables and HTTP headers, as appropriate.</p>
|
|
|
|
</summary>
|
|
<seealso><module>mod_session_cookie</module></seealso>
|
|
<seealso><module>mod_session_crypto</module></seealso>
|
|
<seealso><module>mod_session_dbd</module></seealso>
|
|
|
|
<section id="whatisasession"><title>What is a session?</title>
|
|
<p>At the core of the session interface is a table of key and value pairs
|
|
that are made accessible across browser requests. These pairs can be set
|
|
to any valid string, as needed by the application making use of the
|
|
session.</p>
|
|
|
|
<p>The "session" is a <strong>application/x-www-form-urlencoded</strong>
|
|
string containing these key value pairs, as defined by the
|
|
<a href="http://www.w3.org/TR/html4/">HTML specification</a>.</p>
|
|
|
|
<p>The session can optionally be encrypted and base64 encoded before
|
|
being written to the storage mechanism, as defined by the
|
|
administrator.</p>
|
|
|
|
</section>
|
|
<section id="whocanuseasession"><title>Who can use a session?</title>
|
|
<p>The session interface is primarily developed for the use by other
|
|
server modules, such as <module>mod_auth_form</module>, however CGI
|
|
based applications can optionally be granted access to the contents
|
|
of the session via the HTTP_SESSION environment variable. Sessions
|
|
have the option to be modified and/or updated by inserting an HTTP
|
|
response header containing the new session parameters.</p>
|
|
|
|
</section>
|
|
<section id="serversession"><title>Keeping sessions on the server</title>
|
|
<p>Apache can be configured to keep track of per user sessions stored
|
|
on a particular server or group of servers. This functionality is
|
|
similar to the sessions available in typical application servers.</p>
|
|
|
|
<p>If configured, sessions are tracked through the use of a session ID that
|
|
is stored inside a cookie, or extracted from the parameters embedded
|
|
within the URL query string, as found in a typical GET request.</p>
|
|
|
|
<p>As the contents of the session are stored exclusively on the server,
|
|
there is an expectation of privacy of the contents of the session. This
|
|
does have performance and resource implications should a large number
|
|
of sessions be present, or where a large number of webservers have to
|
|
share sessions with one another.</p>
|
|
|
|
<p>The <module>mod_session_dbd</module> module allows the storage of user
|
|
sessions within a SQL database via <module>mod_dbd</module>.</p>
|
|
|
|
</section> <!-- /serversession -->
|
|
|
|
<section id="browsersession"><title>Keeping sessions on the browser</title>
|
|
<p>In high traffic environments where keeping track of a session on a
|
|
server is too resource intensive or inconvenient, the option exists to store
|
|
the contents of the session within a cookie on the client browser instead.</p>
|
|
|
|
<p>This has the advantage that minimal resources are required on the
|
|
server to keep track of sessions, and multiple servers within a server
|
|
farm have no need to share session information.</p>
|
|
|
|
<p>The contents of the session however are exposed to the client, with a
|
|
corresponding risk of a loss of privacy. The
|
|
<module>mod_session_crypto</module> module can be configured to encrypt the
|
|
contents of the session before writing the session to the client.</p>
|
|
|
|
<p>The <module>mod_session_cookie</module> allows the storage of user
|
|
sessions on the browser within an HTTP cookie.</p>
|
|
|
|
</section> <!-- /browsersession -->
|
|
|
|
<section id="basicexamples"><title>Basic Examples</title>
|
|
|
|
<p>Creating a session is as simple as turning the session on, and deciding
|
|
where the session will be stored. In this example, the session will be
|
|
stored on the browser, in a cookie called <code>session</code>.</p>
|
|
|
|
<example><title>Browser based session</title>
|
|
<highlight language="config">
|
|
Session On
|
|
SessionCookieName session path=/
|
|
</highlight>
|
|
</example>
|
|
|
|
<p>The session is not useful unless it can be written to or read from. The
|
|
following example shows how values can be injected into the session through
|
|
the use of a predetermined HTTP response header called
|
|
<code>X-Replace-Session</code>.</p>
|
|
|
|
<example><title>Writing to a session</title>
|
|
<highlight language="config">
|
|
Session On
|
|
SessionCookieName session path=/
|
|
SessionHeader X-Replace-Session
|
|
</highlight>
|
|
</example>
|
|
|
|
<p>The header should contain name value pairs expressed in the same format
|
|
as a query string in a URL, as in the example below. Setting a key to the
|
|
empty string has the effect of removing that key from the session.</p>
|
|
|
|
<example><title>CGI to write to a session</title>
|
|
<highlight language="sh">
|
|
#!/bin/bash
|
|
echo "Content-Type: text/plain"
|
|
echo "X-Replace-Session: key1=foo&key2=&key3=bar"
|
|
echo
|
|
env
|
|
</highlight>
|
|
</example>
|
|
|
|
<p>If configured, the session can be read back from the HTTP_SESSION
|
|
environment variable. By default, the session is kept private, so this
|
|
has to be explicitly turned on with the
|
|
<directive module="mod_session">SessionEnv</directive> directive.</p>
|
|
|
|
<example><title>Read from a session</title>
|
|
<highlight language="config">
|
|
Session On
|
|
SessionEnv On
|
|
SessionCookieName session path=/
|
|
SessionHeader X-Replace-Session
|
|
</highlight>
|
|
</example>
|
|
|
|
<p>Once read, the CGI variable <code>HTTP_SESSION</code> should contain
|
|
the value <code>key1=foo&key3=bar</code>.</p>
|
|
|
|
</section>
|
|
<section id="sessionprivacy"><title>Session Privacy</title>
|
|
|
|
<p>Using the "show cookies" feature of your browser, you would have seen
|
|
a clear text representation of the session. This could potentially be a
|
|
problem should the end user need to be kept unaware of the contents of
|
|
the session, or where a third party could gain unauthorised access to the
|
|
data within the session.</p>
|
|
|
|
<p>The contents of the session can be optionally encrypted before being
|
|
placed on the browser using the <module>mod_session_crypto</module>
|
|
module.</p>
|
|
|
|
<example><title>Browser based encrypted session</title>
|
|
<highlight language="config">
|
|
Session On
|
|
SessionCryptoPassphrase secret
|
|
SessionCookieName session path=/
|
|
</highlight>
|
|
</example>
|
|
|
|
<p>The session will be automatically decrypted on load, and encrypted on
|
|
save by Apache, the underlying application using the session need have
|
|
no knowledge that encryption is taking place.</p>
|
|
|
|
<p>Sessions stored on the server rather than on the browser can also be
|
|
encrypted as needed, offering privacy where potentially sensitive
|
|
information is being shared between webservers in a server farm using
|
|
the <module>mod_session_dbd</module> module.</p>
|
|
|
|
</section>
|
|
<section id="cookieprivacy"><title>Cookie Privacy</title>
|
|
|
|
<p>The HTTP cookie mechanism also offers privacy features, such as the
|
|
ability to restrict cookie transport to SSL protected pages only, or
|
|
to prevent browser based javascript from gaining access to the contents
|
|
of the cookie.</p>
|
|
|
|
<note type="warning"><title>Warning</title>
|
|
<p>Some of the HTTP cookie privacy features are either non-standard, or
|
|
are not implemented consistently across browsers. The session modules
|
|
allow you to set cookie parameters, but it makes no guarantee that privacy
|
|
will be respected by the browser. If security is a concern, use the
|
|
<module>mod_session_crypto</module> to encrypt the contents of the session,
|
|
or store the session on the server using the <module>mod_session_dbd</module>
|
|
module.</p>
|
|
</note>
|
|
|
|
<p>Standard cookie parameters can be specified after the name of the cookie,
|
|
as in the example below.</p>
|
|
|
|
<example><title>Setting cookie parameters</title>
|
|
<highlight language="config">
|
|
Session On
|
|
SessionCryptoPassphrase secret
|
|
SessionCookieName session path=/private;domain=example.com;httponly;secure;
|
|
</highlight>
|
|
</example>
|
|
|
|
<p>In cases where the Apache server forms the frontend for backend origin servers,
|
|
it is possible to have the session cookies removed from the incoming HTTP headers using
|
|
the <directive module="mod_session_cookie">SessionCookieRemove</directive> directive.
|
|
This keeps the contents of the session cookies from becoming accessible from the
|
|
backend server.
|
|
</p>
|
|
|
|
</section>
|
|
<section id="authentication"><title>Session Support for Authentication</title>
|
|
|
|
<p>As is possible within many application servers, authentication modules can use
|
|
a session for storing the username and password after login. The
|
|
<module>mod_auth_form</module> saves the user's login name and password within
|
|
the session.</p>
|
|
|
|
<example><title>Form based authentication</title>
|
|
<highlight language="config">
|
|
Session On
|
|
SessionCryptoPassphrase secret
|
|
SessionCookieName session path=/
|
|
AuthFormProvider file
|
|
AuthUserFile "conf/passwd"
|
|
AuthType form
|
|
AuthName "realm"
|
|
#...
|
|
</highlight>
|
|
</example>
|
|
|
|
<p>See the <module>mod_auth_form</module> module for documentation and complete
|
|
examples.</p>
|
|
|
|
</section>
|
|
<section id="integration"><title>Integrating Sessions with External Applications</title>
|
|
|
|
<p>In order for sessions to be useful, it must be possible to share the contents
|
|
of a session with external applications, and it must be possible for an
|
|
external application to write a session of its own.</p>
|
|
|
|
<p> A typical example might be an application that changes a user's password set by
|
|
<module>mod_auth_form</module>. This application would need to read the current
|
|
username and password from the session, make the required changes to the user's
|
|
password, and then write the new password to the session in order to provide a
|
|
seamless transition to the new password.</p>
|
|
|
|
<p>A second example might involve an application that registers a new user for
|
|
the first time. When registration is complete, the username and password is
|
|
written to the session, providing a seamless transition to being logged in.</p>
|
|
|
|
<dl>
|
|
<dt>Apache modules</dt>
|
|
<dd>Modules within the server that need access to the session can use the
|
|
<strong>mod_session.h</strong> API in order to read from and write to the
|
|
session. This mechanism is used by modules like <module>mod_auth_form</module>.
|
|
</dd>
|
|
|
|
<dt>CGI programs and scripting languages</dt>
|
|
<dd>Applications that run within the webserver can optionally retrieve the
|
|
value of the session from the <strong>HTTP_SESSION</strong> environment
|
|
variable. The session should be encoded as a
|
|
<strong>application/x-www-form-urlencoded</strong> string as described by the
|
|
<a href="http://www.w3.org/TR/html4/">HTML specification</a>. The environment
|
|
variable is controlled by the setting of the
|
|
<directive module="mod_session">SessionEnv</directive> directive. The session
|
|
can be written to by the script by returning a
|
|
<strong>application/x-www-form-urlencoded</strong> response header with a name
|
|
set by the <directive module="mod_session">SessionHeader</directive>
|
|
directive. In both cases, any encryption or decryption, and the reading the
|
|
session from or writing the session to the chosen storage mechanism is handled
|
|
by the <module>mod_session</module> modules and corresponding configuration.
|
|
</dd>
|
|
|
|
<dt>Applications behind <module>mod_proxy</module></dt>
|
|
<dd>If the <directive module="mod_session">SessionHeader</directive>
|
|
directive is used to define an HTTP request header, the session, encoded as
|
|
a <strong>application/x-www-form-urlencoded</strong> string, will be made
|
|
available to the application. If the same header is provided in the response,
|
|
the value of this response header will be used to replace the session. As
|
|
above, any encryption or decryption, and the reading the session from or
|
|
writing the session to the chosen storage mechanism is handled by the
|
|
<module>mod_session</module> modules and corresponding configuration.</dd>
|
|
|
|
<dt>Standalone applications</dt>
|
|
<dd>Applications might choose to manipulate the session outside the control
|
|
of the Apache HTTP server. In this case, it is the responsibility of the
|
|
application to read the session from the chosen storage mechanism,
|
|
decrypt the session, update the session, encrypt the session and write
|
|
the session to the chosen storage mechanism, as appropriate.</dd>
|
|
</dl>
|
|
|
|
</section>
|
|
|
|
<directivesynopsis>
|
|
<name>Session</name>
|
|
<description>Enables a session for the current directory or location</description>
|
|
<syntax>Session On|Off</syntax>
|
|
<default>Session Off</default>
|
|
<contextlist><context>server config</context>
|
|
<context>virtual host</context>
|
|
<context>directory</context>
|
|
<context>.htaccess</context>
|
|
</contextlist>
|
|
<override>AuthConfig</override>
|
|
|
|
<usage>
|
|
<p>The <directive>Session</directive> directive enables a session for the
|
|
directory or location container. Further directives control where the
|
|
session will be stored and how privacy is maintained.</p>
|
|
</usage>
|
|
</directivesynopsis>
|
|
|
|
<directivesynopsis>
|
|
<name>SessionMaxAge</name>
|
|
<description>Define a maximum age in seconds for a session</description>
|
|
<syntax>SessionMaxAge <var>maxage</var></syntax>
|
|
<default>SessionMaxAge 0</default>
|
|
<contextlist><context>server config</context>
|
|
<context>virtual host</context>
|
|
<context>directory</context>
|
|
<context>.htaccess</context>
|
|
</contextlist>
|
|
<override>AuthConfig</override>
|
|
|
|
<usage>
|
|
<p>The <directive>SessionMaxAge</directive> directive defines a time limit
|
|
for which a session will remain valid. When a session is saved, this time
|
|
limit is reset and an existing session can be continued. If a session
|
|
becomes older than this limit without a request to the server to refresh
|
|
the session, the session will time out and be removed. Where a session is
|
|
used to stored user login details, this has the effect of logging the user
|
|
out automatically after the given time.</p>
|
|
|
|
<p>Setting the maxage to zero disables session expiry.</p>
|
|
</usage>
|
|
</directivesynopsis>
|
|
|
|
<directivesynopsis>
|
|
<name>SessionEnv</name>
|
|
<description>Control whether the contents of the session are written to the
|
|
<var>HTTP_SESSION</var> environment variable</description>
|
|
<syntax>SessionEnv On|Off</syntax>
|
|
<default>SessionEnv Off</default>
|
|
<contextlist><context>server config</context>
|
|
<context>virtual host</context>
|
|
<context>directory</context>
|
|
<context>.htaccess</context>
|
|
</contextlist>
|
|
<override>AuthConfig</override>
|
|
|
|
<usage>
|
|
<p>If set to <var>On</var>, the <directive>SessionEnv</directive> directive
|
|
causes the contents of the session to be written to a CGI environment
|
|
variable called <var>HTTP_SESSION</var>.</p>
|
|
|
|
<p>The string is written in the URL query format, for example:</p>
|
|
|
|
<example>
|
|
<code>key1=foo&key3=bar</code>
|
|
</example>
|
|
|
|
</usage>
|
|
</directivesynopsis>
|
|
|
|
<directivesynopsis>
|
|
<name>SessionHeader</name>
|
|
<description>Import session updates from a given HTTP response header</description>
|
|
<syntax>SessionHeader <var>header</var></syntax>
|
|
<default>none</default>
|
|
<contextlist><context>server config</context>
|
|
<context>virtual host</context>
|
|
<context>directory</context>
|
|
<context>.htaccess</context>
|
|
</contextlist>
|
|
<override>AuthConfig</override>
|
|
|
|
<usage>
|
|
<p>The <directive>SessionHeader</directive> directive defines the name of an
|
|
HTTP response header which, if present, will be parsed and written to the
|
|
current session.</p>
|
|
|
|
<p>The header value is expected to be in the URL query format, for example:</p>
|
|
|
|
<example>
|
|
<code>key1=foo&key2=&key3=bar</code>
|
|
</example>
|
|
|
|
<p>Where a key is set to the empty string, that key will be removed from the
|
|
session.</p>
|
|
|
|
</usage>
|
|
</directivesynopsis>
|
|
|
|
<directivesynopsis>
|
|
<name>SessionInclude</name>
|
|
<description>Define URL prefixes for which a session is valid</description>
|
|
<syntax>SessionInclude <var>path</var></syntax>
|
|
<default>all URLs</default>
|
|
<contextlist><context>server config</context>
|
|
<context>virtual host</context>
|
|
<context>directory</context>
|
|
<context>.htaccess</context>
|
|
</contextlist>
|
|
<override>AuthConfig</override>
|
|
|
|
<usage>
|
|
<p>The <directive>SessionInclude</directive> directive allows sessions to
|
|
be made valid for specific URL prefixes only. This can be used to make a
|
|
website more efficient, by targeting a more precise URL space for which
|
|
a session should be maintained. By default, all URLs within the directory
|
|
or location are included in the session.</p>
|
|
|
|
<note type="warning"><title>Warning</title>
|
|
<p>This directive has a similar purpose to the <var>path</var> attribute
|
|
in HTTP cookies, but should not be confused with this attribute. This
|
|
directive does not set the <var>path</var> attribute, which must be
|
|
configured separately.</p></note>
|
|
</usage>
|
|
</directivesynopsis>
|
|
|
|
<directivesynopsis>
|
|
<name>SessionExclude</name>
|
|
<description>Define URL prefixes for which a session is ignored</description>
|
|
<syntax>SessionExclude <var>path</var></syntax>
|
|
<default>none</default>
|
|
<contextlist><context>server config</context>
|
|
<context>virtual host</context>
|
|
<context>directory</context>
|
|
<context>.htaccess</context>
|
|
</contextlist>
|
|
<override>AuthConfig</override>
|
|
|
|
<usage>
|
|
<p>The <directive>SessionExclude</directive> directive allows sessions to
|
|
be disabled relative to URL prefixes only. This can be used to make a
|
|
website more efficient, by targeting a more precise URL space for which
|
|
a session should be maintained. By default, all URLs within the directory
|
|
or location are included in the session. The
|
|
<directive module="mod_session">SessionExclude</directive> directive takes
|
|
precedence over the
|
|
<directive module="mod_session">SessionInclude</directive> directive.</p>
|
|
|
|
<note type="warning"><title>Warning</title>
|
|
<p>This directive has a similar purpose to the <var>path</var> attribute
|
|
in HTTP cookies, but should not be confused with this attribute. This
|
|
directive does not set the <var>path</var> attribute, which must be
|
|
configured separately.</p></note>
|
|
</usage>
|
|
</directivesynopsis>
|
|
|
|
<directivesynopsis>
|
|
<name>SessionExpiryUpdateInterval</name>
|
|
<description>Define the number of seconds a session's expiry may change without
|
|
the session being updated</description>
|
|
<syntax>SessionExpiryUpdateInterval <var>interval</var></syntax>
|
|
<default>SessionExpiryUpdateInterval 0 (always update)</default>
|
|
<contextlist><context>server config</context>
|
|
<context>virtual host</context>
|
|
<context>directory</context>
|
|
<context>.htaccess</context>
|
|
</contextlist>
|
|
<override>AuthConfig</override>
|
|
|
|
<usage>
|
|
<p>The <directive>SessionExpiryUpdateInterval</directive> directive allows
|
|
sessions to avoid the cost associated with writing the session each request
|
|
when only the expiry time has changed. This can be used to make a website
|
|
more efficient or reduce load on a database when using
|
|
<module>mod_session_dbd</module>. The session is always written if the data
|
|
stored in the session has changed or the expiry has changed by more than the
|
|
configured interval.</p>
|
|
|
|
<p>Setting the interval to zero disables this directive, and the session
|
|
expiry is refreshed for each request.</p>
|
|
|
|
<p>This directive only has an effect when combined with
|
|
<directive module="mod_session">SessionMaxAge</directive> to enable session
|
|
expiry. Sessions without an expiry are only written when the data stored in
|
|
the session has changed.</p>
|
|
|
|
<note type="warning"><title>Warning</title>
|
|
<p>Because the session expiry may not be refreshed with each request, it's
|
|
possible for sessions to expire up to <var>interval</var> seconds early.
|
|
Using a small interval usually provides sufficient savings while having a
|
|
minimal effect on expiry resolution.</p></note>
|
|
</usage>
|
|
</directivesynopsis>
|
|
|
|
</modulesynopsis>
|