In this issue
Release: 1.1.1
Beta: None
Bugs reported in 1.1.1:
-
Problems if a ServerPath name matches the beginning of a
filename in the document root
-
When listening on multiple ports and using virtual hosts,
automatically generated redirects can have the wrong port
number
After six months development, a beta of Apache 1.2 is due out
at the start of December. This next release includes a lot of
new functions, some extra modules, and many minor
improvements and bug fixes. The current schedule is for a
beta release around the weekend of the 1st December.
Apache Week will report in detail on the changes in 1.2 when
it is released.
The first beta release of 1.2, to be called 1.2b1, is
scheduled for the first week in December. No new features
will now be added, and it is undergoing internal testing and
any outstanding bugs are being fixed. Documentation on the
new features is being written.
For a list of some of the new features coming in 1.2, see our
Apache
1.2 Sneak Preview. This is now slightly out-of-date and
after 1.2b1 is released we will have a full guide to what's
new in 1.2 in the next issue.
Satisfy Implemented
One of the most important differences between the NCSA HTTPd
and Apache has been the Satisfy directive. On NCSA,
this lets a restricted area be accessible either to people in
a specific domain, or who enter the correct username and
password. It is commonly used to let people from a particular
set of domains into a restricted set of pages without asking
for a password, but if anyone accesses them from outside they
must enter a username and password.
User Tracking Cookies off by Default
The user-tracking module (called the cookies module in Apache
1.1.1) will now default to not sending cookies on each
request, unless explicitly turned on. The directive
CookieTracking can be used to turn on the generation
of cookies for each request (this replaces the
CookieEnable directive we reported on in Apache Week
26).
This week, we explain how to store user authentication
information in DBM files for faster access when you have
thousands of users.
Recently (see Apache Week
37) we explained how to use user authentication to
restrict pages to selected people. We showed how to use the
htpasswd program to create the necessary .htpasswd
files, and how to create group files to provide more control
over the users. We also said that .htpasswd files and group
files like this are not very efficient when a large number of
users are involved. This is because these are plain text
files and for every request in the authenticated area Apache
has to read through the file looking for the user. A much
faster way to store the user information is to use files in
DBM format. This article explains how to create and
manage DBM format user authentication files.
What is DBM?
DBM files are a simple and relatively standard method of
storing information for quick retrieval. Each item of
information stored in a DBM file consists of two parts: a
key and a value. If you know the key you can
access the value very quickly. The DBM file maintains an
'index' of the keys, each of which points to where the value
is stored within the file, and the index is usually arranged
such that values can be accessed with the minimum number of
file system accesses even for very large numbers of keys.
In practice, on many systems a DBM 'file' is actually stored
in two files on the disk. If, for example, a DBM file called
'users' is created, it will actually be stored in files
called users.pag and users.dir. If you ever
need to rename or delete a DBM from the command line,
remember to change both the files, keeping the
extensions (.pag and .dir) the same. Some newer versions of
DBM only create one file.
Provided the key is known in advance DBM format files are a
very efficient way of accessing information associated with
that key. For web user authentication, the key will be the
username, and the value will store their (encrypted)
password. Looking up usernames and their passwords in a DBM
file will be more efficient than using a plain text file when
more than a few users are involved. This will be particularly
important for sites with lots of users (say, over 10,000) or
where there are lots of accesses to authenticated pages.
Preparing Apache for DBM Files
If you want to use DBM format files with Apache, you will
need to make sure it is compiled with DBM support. By
default, Apache cannot use DBM files for user authentication,
so the optional DBM authentication module needs to be
included. Note that this is included in addition to
the normal user authentication module (which uses plain text
files, as explained in the previous article). It is possible
to have support for multiple file formats compiled into
Apache at the same time.
To add the DBM authentication module, edit your Configuration
file in the Apache src directory. Remove the comment from the
line which currently says
# Module dbm_auth_module mod_auth_dbm.o
To remove the comment, delete the # and space character at
the right-hand end of the line. Now update the Apache
configuration by running ./Configure, then re-make
the executable with make.
However, before compiling you might also need to tell Apache
where to find the DBM functions. On some systems this is
automatic. On others you will need to add the text
-lndbm or -ldbm to the EXTRA_LIBS line in
the Configuration file. (Apache 1.2 will attempt to do this
automatically if needed, but you might still need to
configure it manually in some cases). If you are not sure
what your system requires, try leaving it blank and
compiling. If at the end of the compilation you see errors
about functions such as _dbm_fetch() not being found, try
each of these choices in turn. (Remember to re-run
./Configure after changing Configuration). If you
still cannot get it to compile, you might have a system where
the DBM library is installed in a non-standard directory, or
where the there is no DBM library available. You could either
contact you system administrator, or download and compile
your own copy of the DBM libraries (a good choice might be
GDBM:
read about it or download it).
Creating A DBM Users File
For standard (htpasswd) user authentication password files,
the program htpasswd is used to add new users and set their
passwords. To create and manage DBM format user files another
program from the Apache support directory is used. The
program is called dbmmanage and is written in perl (so
you will need perl on your system, and it will need to have
been compiled with support for the same DBM library you
compiled into Apache. If you have only just installed DBM on
your system you will might need to re-compile perl to build
in DBM support).
This program can be used to create a new DBM file, add users
and passwords to it, change passwords, or delete users. To
start by creating a new DBM file and adding a user to it, run
the command:
dbmmanage /usr/local/etc/httpd/users adduser martin hamster
The creates the DBM file /usr/local/etc/httpd/usersdbm (which
might actually consist of /usr/local/etc/httpd/usersdbm.dir
and /usr/local/etc/httpd/usersdbm.pag), if it does not
already exist. It then adds the user 'martin' with password
'hamster'. This command can be used with other usernames and
passwords to add more users, or with an existing username to
change that user's password. A user can be deleted from the
password file with
dbmmanage /usr/local/etc/httpd/usersdbm delete martin
You can get a list of all the users in the DBM file with
dbmmanage /usr/local/etc/httpd/usersdbm view
Restricting a Directory
Now you have a DBM user authentication file with some users
in it, you are ready to create an authenticated area. You can
restrict a directory either using a <Directory> section
in access.conf or by using a .htaccess file. The article in
Apache Week 37 explained how you can setup a basic .htaccess
file, using this example:
AuthName "restricted stuff"
AuthType Basic
AuthUserFile /usr/local/etc/httpd/users
require valid-user
To use DBM files, the only change is to replace the directive
AuthUserFile line with
AuthDBMUserFile /usr/local/etc/httpd/usersdbm
This single change tells Apache that the user file is now in
a DBM format, rather than plain text. All the rest of the
user authentication setup remains the same (so the
authentication type is still Basic, and the syntax of
require is the same as before).
Using Groups
Each user can be in one or more "groups", and you can
restrict access to people just in a specified group. This
makes it possible to manage all your users on your site in a
single database, and customise the areas that each can
access. The use of DBM files for storing group information is
particularly efficient because you can use the same file to
store both password and group information.
The dbmmanage command can be used to set group
information for users. For example, to add the user "martin"
to the group "staff", you would use
dbmmanage /usr/local/etc/httpd/users adduser martin hamster staff
You put a user into multiple groups but listing them,
separated by commas. For example,
dbmmanage /usr/local/etc/httpd/users adduser martin hamster staff,admin
Note that dbmmanage has to be told the password as well, and
there is no way to set or change group information for a user
without knowing their password. This means in practice that
dbmmanage is not suitable for managing users in groups, and
you will have to write your own management scripts. Some help
writing perl to manage DBM files is given later in this
article.
After creating a user and group file containing details of
which users are in which groups, you can restrict access by
these groups. For example, to restrict access to an area to
only people in the group staff, you could use:
AuthName "restricted stuff"
AuthType Basic
AuthDBMUserFile /usr/local/etc/httpd/users
AuthDBMGroupFile /usr/local/etc/httpd/users
require group staff
|