经过限制referer来实现防盗链的功能 配置文件增长以下内容php
<Directory /data/wwwroot/110.com> SetEnvIfNoCase Referer "http://www.110.com" local_ref SetEnvIfNoCase Referer "http://110.com" local_ref SetEnvIfNoCase Referer "http://ask.apelearn.com " local_ref //加这条主要为了从阿铭论坛发帖测试防盗链 #空Referer也设为白名单 SetEnvIfNoCase Referer "^$" local_ref <FilesMatch "\.(txt|doc|mp3|zip|rar|jpg|gif|png)"> # 定义访问控制顺序 Order Allow,Deny Allow from env=local_ref </FilesMatch> </Directory>
空Referer 表示直接访问也能访问html
curl -e "http://ask.apelearn.com/question/17700"; -x127.0.0.1:80 www.110.com/images/123.gif -I // -e 自定义referervim
核心配置文件内容curl
<Directory /data/wwwroot/110.com/admin/> # Order设定的是先拒绝,后容许, 以最后一条为准, 若是颠倒过来为 allow, deny 则 127.0.0.1 也被拒绝 Order deny,allow Deny from all #控制来源ip为 127.0.0.1 Allow from 127.0.0.1 </Directory>
mdkir /data/wwwroot/110.com/admin测试
vim /data/wwwroot/110.com/admin/index.php 并写点东西url
curl -x127.0.0.1:80 www.110.com/admin/index.php -I //红色是目标ipcode
curl -x192.168.192.134 www.110.com/admin/index.php -I // 403被限制访问了htm
curl测试状态码为403则被限制访问了blog
Order 配置一列 https://www.cnblogs.com/top5/archive/2009/09/22/1571709.htmlip
核心配置文件内容
<Directory /data/wwwroot/110.com> <FilesMatch "admin.php(.*)"> Order deny,allow Deny from all Allow from 127.0.0.1 </FilesMatch> </Directory>