07-12-2014 03:17 PM
07-15-2014 04:58 PM
07-15-2014 05:10 PM
[Tue Jul 15 22:16:56 2014] [warn] No JkLogFile defined in httpd.conf. Using default /etc/httpd/logs/mod_jk.log
[Tue Jul 15 22:16:56 2014] [warn] No JkShmFile defined in httpd.conf. Using default /etc/httpd/logs/jk-runtime-status
[Tue Jul 15 22:16:56 2014] [notice] suEXEC mechanism enabled (wrapper: /usr/sbin/suexec)
[Tue Jul 15 22:16:56 2014] [warn] No JkLogFile defined in httpd.conf. Using default /etc/httpd/logs/mod_jk.log
[Tue Jul 15 22:16:56 2014] [warn] No JkShmFile defined in httpd.conf. Using default /etc/httpd/logs/jk-runtime-status
[Tue Jul 15 22:16:56 2014] [notice] Digest: generating secret for digest authentication …
[Tue Jul 15 22:16:56 2014] [notice] Digest: done
[Tue Jul 15 22:16:56 2014] [notice] Apache/2.2.15 (Unix) mod_jk/1.2.40 DAV/2 mod_ssl/2.2.15 OpenSSL/1.0.1e-fips configured – resuming normal operations
[Tue Jul 15 23:11:35 2014] [error] [client 54.227.195.79] Directory index forbidden by Options directive: /var/www/html/
[Tue Jul 15 23:57:32 2014] [error] [client 173.21.115.68] Directory index forbidden by Options directive: /var/www/html/
07-16-2014 12:00 PM
07-16-2014 09:51 PM
07-17-2014 03:54 PM
07-17-2014 05:59 PM
07-18-2014 11:52 AM
<alfresco-config>
<!– Example config to turn off the CSRF filter
<config evaluator="string-compare" condition="CSRFPolicy" replace="true">
<filter/>
</config>–>
<!– Configuration for Apache reverse proxy on localhost:8089 –>
<config evaluator="string-compare" condition="CSRFPolicy" replace="true">
<!–
Will be used and exposed to the client side code in Alfresco.contants.CSRF_POLICY.
Use the Alfresco.util.CSRFPolicy.getHeader() or Alfresco.util.CSRFPolicy.getParameter() with Alfresco.util.CSRFPolicy.getToken()
to set the token in custom 3rd party code.
–>
<client>
<cookie>Alfresco-CSRFToken</cookie>
<header>Alfresco-CSRFToken</header>
<parameter>Alfresco-CSRFToken</parameter>
</client>
<!– The first rule with a matching request will get its action invoked, the remaining rules will be ignored. –>
<filter>
<!–
Certain Surf POST requests form the WebScript console must be allowed to pass without a token since
the Surf WebScript console code can't be dependent on a Share specific filter.
–>
<rule>
<request>
<method>POST</method>
<path>^\/page\/caches\/dependency\/clear|^\/page\/index|^\/page\/surfBugStatus|^\/page\/modules\/deploy|^\/page\/modules\/module|^\/page\/api\/javascript\/debugger</path>
</request>
<action name="assertReferer">
<param name="always">false</param>
<param name="referer">https://FQDN/.*</param>
</action>
<action name="assertOrigin">
<param name="always">false</param>
<param name="origin">https://FQDN</param>
</action>
</rule>
<!– Certain Share POST requests does NOT require a token –>
<rule>
<request>
<method>POST</method>
<path>^/page/dologin.*|^\/page/site\/[^\/]+\/start-workflow|^\/page/start-workflow</path>
</request>
<action name="assertReferer">
<param name="always">false</param>
<param name="referer">https://FQDN/.*</param>
</action>
<action name="assertOrigin">
<param name="always">false</param>
<param name="origin">https://FQDN</param>
</action>
</rule>
<!– Clear the token when logging out –>
<rule>
<request>
<method>GET</method>
<path>^/page/dologout.*</path>
</request>
<action name="clearToken">
<param name="session">Alfresco-CSRFToken</param>
<param name="cookie">Alfresco-CSRFToken</param>
</action>
</rule>
<!– Make sure the first token is generated –>
<rule>
<request>
<session>
<attribute name="_alf_USER_ID">.*</attribute>
<attribute name="Alfresco-CSRFToken"/>
<!– empty attribute element indicates null –>
</session>
</request>
<action name="generateToken">
<param name="session">Alfresco-CSRFToken</param>
<param name="cookie">Alfresco-CSRFToken</param>
</action>
</rule>
<!– Refresh token on new "page" visit when a user is logged in –>
<rule>
<request>
<method>GET</method>
<path>^/page/.*</path>
<session>
<attribute name="_alf_USER_ID">.*</attribute>
<attribute name="Alfresco-CSRFToken">.*</attribute>
</session>
</request>
<action name="generateToken">
<param name="session">Alfresco-CSRFToken</param>
<param name="cookie">Alfresco-CSRFToken</param>
</action>
</rule>
<!– Verify multipart requests contains the token as a parameter and also correct referer & origin header if available –>
<rule>
<request>
<method>POST</method>
<header name="Content-Type">^multipart/.*</header>
<session>
<attribute name="_alf_USER_ID">.*</attribute>
</session>
</request>
<action name="assertToken">
<param name="session">Alfresco-CSRFToken</param>
<param name="parameter">Alfresco-CSRFToken</param>
</action>
<action name="assertReferer">
<param name="always">false</param>
<param name="referer">https://FQDN/.*</param>
</action>
<action name="assertOrigin">
<param name="always">false</param>
<param name="origin">https://FQDN</param>
</action>
</rule>
<!–
Verify there is a token in the header for remaining state changing requests and also correct
referer & origin headers if available. We "catch" all content types since just setting it to
"application/json.*" since a webscript that doesn't require a json request body otherwise would be
successfully executed using i.e. "text/plain".
–>
<rule>
<request>
<method>POST|PUT|DELETE</method>
<session>
<attribute name="_alf_USER_ID">.*</attribute>
</session>
</request>
<action name="assertToken">
<param name="session">Alfresco-CSRFToken</param>
<param name="header">Alfresco-CSRFToken</param>
</action>
<action name="assertReferer">
<param name="always">false</param>
<param name="referer">https://FQDN/.*</param>
</action>
<action name="assertOrigin">
<param name="always">false</param>
<param name="origin">https://FQDN</param>
</action>
</rule>
</filter>
</config>
</alfresco-config>
07-20-2014 01:02 PM
07-20-2014 01:03 PM
08-05-2014 12:54 PM
Tags
Find what you came for
We want to make your experience in Hyland Connect as valuable as possible, so we put together some helpful links.