You now have successfully built and installed the Apache 1.3 HTTP server

por | 25 noviembre, 2006

+——————————————————–+
| You now have successfully built and installed the |
| Apache 1.3 HTTP server. To verify that Apache actually |
| works correctly you now should first check the |
| (initially created or preserved) configuration files |
| |
| /usr/local/etc/apache/httpd.conf
| |
| and then you should be able to immediately fire up |
| Apache the first time by running: |
| |
| /usr/local/sbin/apachectl start
| |
| Thanks for using Apache. The Apache Group |
| http://www.apache.org/ |
+——————————————————–+
install -o root -g wheel -m 555 /usr/ports/www/apache13/work/apache_1.3.34/apac he.sh /usr/local/etc/rc.d/apache.sh
===> COMPATIBILITY NOTE:
As of version 1.3.24, the RedirectMatch directive requires an
absolute URL target location per RFC 2068. Uses of RedirectMatch that
specify a relative URL will fail and must be corrected to function.

===> BE CAREFULL HOW TO BOOT on 1.3.29_4 or after:
To run apache www server from startup, add apache_enable=”YES”
in your /etc/rc.conf.
===> Compressing manual pages for apache-1.3.34_4
===> Registering installation for apache-1.3.34_4
===> SECURITY REPORT:
This port has installed the following files which may act as network
servers and may therefore pose a remote security risk to the system.
/usr/local/libexec/apache/libproxy.so (USES POSSIBLY INSECURE FUNCTIONS: mktemp)
/usr/local/sbin/httpd

This port has installed the following startup scripts which may cause
these network services to be started at boot time.
/usr/local/etc/rc.d/apache.sh

If there are vulnerabilities in these programs there may be a security
risk to the system. FreeBSD makes no guarantee about the security of
ports included in the Ports Collection. Please type ‘make deinstall’
to deinstall the port if this is a concern.

For more information, and contact details about the security
status of this software, see the following webpage:
http://httpd.apache.org/