Forum Moderators: phranque
One wonders if you can only deny an IP
after
it has been explicitly allowed?
what's this about "Limit HEAD GET POST PUT, etc"
I stand to be corrected, but I presume this limits the rules to listed methods. So if you have Limit POST then the blocking would only happen for POST requests, but GET etc. requests from the same denied IP would go through.
If you want to block any kind of access from a particular IP, I think you do not have to specify the "Limit" directive.
One wonders if you can only deny an IP
after
it has been explicitly allowed?
No match >> Default to second directive
Match both Allow & Deny >> Final match controls
If you want to block any kind of access from a particular IP, I think you do not have to specify the "Limit" directive.
First all lines beginning in "onething" are read.
Then all lines beginning in "otherthing" are read, potentially overriding "onething" directives.
Hey, JD, I don't think I ever realized that apache dot org had a /current/ pseudo-directory paralleling the exact numbers 2.2 and 2.4.
Some examples I've seen have "Limit GET POST", and others have "Limit GET HEAD POST". Is there some reason why one would want to have someone access a header without being able to GET the file?
AllowOverride All AuthConfig
When this directive is set to All, then any directive which has the .htaccess Context is allowed in .htaccess files.
Sounds like the AllowOverride settings in your httpd.conf aren't inclusive of Limit, which means you can't use order, allow, deny in the .htaccess.
You're not running 1.3 at this late date, I hope!
deny from 123.125.67.0/155 does not work (produces an error), and so does
deny from 123.125.67.0-123.125.67.255