<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>apache &#8211; 21點情報網</title>
	<atom:link href="https://ailog.tw/lifelog/tag/apache/feed/" rel="self" type="application/rss+xml" />
	<link>https://ailog.tw/lifelog</link>
	<description></description>
	<lastBuildDate>Mon, 27 Dec 2021 13:15:22 +0000</lastBuildDate>
	<language>zh-TW</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.3</generator>
	<item>
		<title>Ubuntu Linux更新Apache至最新版本方法</title>
		<link>https://ailog.tw/lifelog/2021/12/27/ubuntu-apache-update/</link>
		
		<dc:creator><![CDATA[blackjack]]></dc:creator>
		<pubDate>Mon, 27 Dec 2021 12:41:54 +0000</pubDate>
				<category><![CDATA[3C資訊]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[2.4.52]]></category>
		<category><![CDATA[apache]]></category>
		<category><![CDATA[latest]]></category>
		<category><![CDATA[Server]]></category>
		<category><![CDATA[Ubuntu]]></category>
		<category><![CDATA[Ubuntu更新Apache至最新版本方法]]></category>
		<category><![CDATA[web]]></category>
		<category><![CDATA[升級]]></category>
		<category><![CDATA[更新]]></category>
		<category><![CDATA[最新版]]></category>
		<guid isPermaLink="false">https://ailog.tw/lifelog/?p=12216</guid>

					<description><![CDATA[使用Ubuntu內建的更新方法來更新Apache，會發現並無法更新到最新版本，如又遇上有資安要求必須更新至最新 &#8230; <p class="link-more"><a href="https://ailog.tw/lifelog/2021/12/27/ubuntu-apache-update/" class="more-link">閱讀全文<span class="screen-reader-text">〈Ubuntu Linux更新Apache至最新版本方法〉</span></a></p>]]></description>
										<content:encoded><![CDATA[<p><span style="font-size: 14pt; font-family: verdana, geneva;">使用Ubuntu內建的更新方法來更新Apache，會發現並無法更新到最新版本，如又遇上有資安要求必須更新至最新版本，那該如何排除呢?</span><br />
<span style="font-size: 14pt; font-family: verdana, geneva;">別擔心~今天小編要介紹快速又便捷的方法，讓你在Ubuntu系統上簡單更新至Apache最新版本。<span id="more-12216"></span></span></p>
<p><span style="font-size: 14pt; font-family: verdana, geneva;">[範例環境]</span><br />
<span style="font-size: 14pt; font-family: verdana, geneva;">作業系統：Ubuntu 20.04.3 LTS</span><br />
<span style="font-size: 14pt; font-family: verdana, geneva;">Apache：2.4.41</span></p>
<p><span style="font-size: 14pt; font-family: verdana, geneva;">[更新步驟]</span><br />
<span style="font-size: 14pt; font-family: verdana, geneva;">Set01、透過「apt-get update」更新Ubuntu 至最新</span><br />
<span style="font-size: 14pt; font-family: verdana, geneva;">步驟可以參考：</span><br />
<span style="font-size: 14pt; font-family: verdana, geneva;"><a href="https://ailog.tw/lifelog/2019/08/18/ubuntu-update/">https://ailog.tw/lifelog/2019/08/18/ubuntu-update/</a></span></p>
<p><span style="font-size: 14pt; font-family: verdana, geneva;">Set02、確認目前的Apache版本</span><br />
<span style="font-size: 14pt; font-family: verdana, geneva;">語法：</span><br />
<span style="font-size: 14pt; font-family: verdana, geneva;">apache2 -v<br />
<img decoding="async" class="alignnone wp-image-12221 size-full" src="https://ailog.tw/lifelog/wp-content/uploads/2021/12/ubuntu-apache-update-01-1.png" alt="" width="428" height="94" srcset="https://ailog.tw/lifelog/wp-content/uploads/2021/12/ubuntu-apache-update-01-1.png 428w, https://ailog.tw/lifelog/wp-content/uploads/2021/12/ubuntu-apache-update-01-1-300x66.png 300w" sizes="(max-width: 428px) 100vw, 428px" /></span></p>
<p><span style="font-size: 14pt; font-family: verdana, geneva;">Set03、新增 Apache PPA</span><br />
<span style="font-size: 14pt; font-family: verdana, geneva;">語法：</span><br />
<span style="font-size: 14pt; font-family: verdana, geneva;"><span class="token function">sudo</span> add-apt-repository ppa:ondrej/apache2 -y <span class="token operator">&amp;&amp;</span> <span class="token function">sudo</span> <span class="token function">apt</span> update</span><br />
<span style="font-size: 14pt; font-family: verdana, geneva;"><img fetchpriority="high" decoding="async" class="alignnone size-full wp-image-12220" src="https://ailog.tw/lifelog/wp-content/uploads/2021/12/ubuntu-apache-update-02.png" alt="" width="893" height="68" srcset="https://ailog.tw/lifelog/wp-content/uploads/2021/12/ubuntu-apache-update-02.png 893w, https://ailog.tw/lifelog/wp-content/uploads/2021/12/ubuntu-apache-update-02-300x23.png 300w, https://ailog.tw/lifelog/wp-content/uploads/2021/12/ubuntu-apache-update-02-768x58.png 768w" sizes="(max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></span></p>
<p><span style="font-size: 14pt; font-family: verdana, geneva;">Set04、升級 Apache Web 服務器</span><br />
<span style="font-size: 14pt; font-family: verdana, geneva;">語法：</span><br />
<span style="font-size: 14pt; font-family: verdana, geneva;">sudo apt install apache2</span><br />
<span style="font-size: 14pt; font-family: verdana, geneva;"><img decoding="async" class="alignnone size-full wp-image-12222" src="https://ailog.tw/lifelog/wp-content/uploads/2021/12/ubuntu-apache-update-03.png" alt="" width="460" height="96" srcset="https://ailog.tw/lifelog/wp-content/uploads/2021/12/ubuntu-apache-update-03.png 460w, https://ailog.tw/lifelog/wp-content/uploads/2021/12/ubuntu-apache-update-03-300x63.png 300w" sizes="(max-width: 460px) 100vw, 460px" /></span></p>
<p><span style="font-size: 14pt; font-family: verdana, geneva;">Set05、驗證更新後的Apache版本<br />
語法：</span><br />
<span style="font-size: 14pt; font-family: verdana, geneva;">apache2 -v</span><br />
<span style="font-size: 14pt; font-family: verdana, geneva;"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-12223" src="https://ailog.tw/lifelog/wp-content/uploads/2021/12/ubuntu-apache-update-04.png" alt="" width="427" height="91" srcset="https://ailog.tw/lifelog/wp-content/uploads/2021/12/ubuntu-apache-update-04.png 427w, https://ailog.tw/lifelog/wp-content/uploads/2021/12/ubuntu-apache-update-04-300x64.png 300w" sizes="auto, (max-width: 427px) 100vw, 427px" /></span></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Apache HTTP伺服器發現CVE-2021-44224與44790漏洞</title>
		<link>https://ailog.tw/lifelog/2021/12/27/cve-2021-44224-44790/</link>
		
		<dc:creator><![CDATA[blackjack]]></dc:creator>
		<pubDate>Mon, 27 Dec 2021 12:23:09 +0000</pubDate>
				<category><![CDATA[3C資訊]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[apache]]></category>
		<category><![CDATA[apache2]]></category>
		<category><![CDATA[CVE-2021-44224]]></category>
		<category><![CDATA[CVE-2021-44790]]></category>
		<category><![CDATA[httpd]]></category>
		<category><![CDATA[httpd2]]></category>
		<category><![CDATA[web]]></category>
		<category><![CDATA[網頁伺服器]]></category>
		<guid isPermaLink="false">https://ailog.tw/lifelog/?p=12214</guid>

					<description><![CDATA[2021年底真是不平靜的日子，離log4j沒幾個禮拜，Apache HTTP Server又發佈了CVE-20 &#8230; <p class="link-more"><a href="https://ailog.tw/lifelog/2021/12/27/cve-2021-44224-44790/" class="more-link">閱讀全文<span class="screen-reader-text">〈Apache HTTP伺服器發現CVE-2021-44224與44790漏洞〉</span></a></p>]]></description>
										<content:encoded><![CDATA[<p><span style="font-size: 14pt; font-family: verdana, geneva;">2021年底真是不平靜的日子，離log4j沒幾個禮拜，Apache HTTP Server又發佈了CVE-2021-44224及CVE-2021-44790漏洞。</span><br />
<span style="font-size: 14pt; font-family: verdana, geneva;">呼籲管理者盡快更新，才可安心跨年呀~<span id="more-12214"></span></span></p>
<p><span style="font-size: 14pt; font-family: verdana, geneva;">[遭受影響的版本]</span><br />
<span style="font-size: 14pt; font-family: verdana, geneva;">CVE-2021-44224：</span><br />
<span style="font-size: 14pt; font-family: verdana, geneva;">Apache HTTP Server 2.4.7至2.4.51(含)版本</span></p>
<p><span style="font-size: 14pt; font-family: verdana, geneva;">CVE-2021-44790：</span><br />
<span style="font-size: 14pt; font-family: verdana, geneva;">Apache HTTP Server 2.4.51(含)以前版本</span></p>
<p><span style="font-size: 14pt; font-family: verdana, geneva;">[應對措施]</span><br />
<span style="font-size: 14pt; font-family: verdana, geneva;">將Apache HTTP Server版本更新至2.4.52</span></p>
<p><span style="font-size: 14pt; font-family: verdana, geneva;">[Apache更新參考]</span><br />
<span style="font-size: 14pt; font-family: verdana, geneva;"><a href="https://ailog.tw/lifelog/2021/12/27/ubuntu-apache-update/">https://ailog.tw/lifelog/2021/12/27/ubuntu-apache-update/</a></span></p>
<p><span style="font-size: 14pt; font-family: verdana, geneva;">Apache官方網頁相關說明：</span><br />
<span style="font-size: 14pt; font-family: verdana, geneva;"><a href="https://httpd.apache.org/security/vulnerabilities_24.html">https://httpd.apache.org/security/vulnerabilities_24.html</a></span></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>CVSS 3.0評定滿分的CVE-2021-44228漏洞</title>
		<link>https://ailog.tw/lifelog/2021/12/14/cve-2021-44228/</link>
		
		<dc:creator><![CDATA[blackjack]]></dc:creator>
		<pubDate>Tue, 14 Dec 2021 14:42:51 +0000</pubDate>
				<category><![CDATA[3C資訊]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[apache]]></category>
		<category><![CDATA[CVE-2021-44228]]></category>
		<category><![CDATA[CVSS]]></category>
		<category><![CDATA[CVSS 3.0評定滿分的CVE-2021-44228漏洞]]></category>
		<category><![CDATA[log4j]]></category>
		<guid isPermaLink="false">https://ailog.tw/lifelog/?p=12167</guid>

					<description><![CDATA[Apache於2021年12月份發布了Log4j 2.15.0的修補版本，該版本修補了CVE-2021-442 &#8230; <p class="link-more"><a href="https://ailog.tw/lifelog/2021/12/14/cve-2021-44228/" class="more-link">閱讀全文<span class="screen-reader-text">〈CVSS 3.0評定滿分的CVE-2021-44228漏洞〉</span></a></p>]]></description>
										<content:encoded><![CDATA[<p><span style="font-size: 14pt; font-family: verdana, geneva;">Apache於2021年12月份發布了Log4j 2.15.0的修補版本，該版本修補了CVE-2021-44228漏洞，該漏洞會被評定為最高等級原因是該套件被應用的很廣泛，所多知名廠商都被影響到。<span id="more-12167"></span>漏洞流程說明：</span><br />
<span style="font-size: 14pt; font-family: verdana, geneva;"><img decoding="async" src="https://www.fortinet.com/blog/psirt-blogs/apache-log4j-vulnerability/_jcr_content/root/responsivegrid/image.img.png/1639460358616/log4j-01.png" alt="Log4j 漏洞圖" /></span><br />
<span style="font-size: 10pt; font-family: verdana, geneva;">圖片來自fortinet官方網頁：<a href="https://www.fortinet.com/blog/psirt-blogs/apache-log4j-vulnerability">https://www.fortinet.com/blog/psirt-blogs/apache-log4j-vulnerability</a></span></p>
<p><span style="font-size: 14pt; font-family: verdana, geneva;">Juniper 官方Blog有更詳細的攻擊過程說明：</span><br />
<span style="font-size: 12pt; font-family: verdana, geneva;"><a href="https://blogs.juniper.net/en-us/security/apache-log4j-vulnerability-cve-2021-44228-raises-widespread-concerns">https://blogs.juniper.net/en-us/security/apache-log4j-vulnerability-cve-2021-44228-raises-widespread-concerns</a></span></p>
<p><span style="font-size: 14pt; font-family: verdana, geneva;">漏洞影響程度：<br />
攻擊者透過Log4j的漏洞，將可以控制LDAP與其他JNDI有關的端點。</span></p>
<p><span style="font-size: 14pt; font-family: verdana, geneva;">漏洞評分：<br />
</span>為10分，被評定最高危險等級。</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>小編推工具-線上檢測伺服器TLS支援版本</title>
		<link>https://ailog.tw/lifelog/2021/06/19/tls-check/</link>
		
		<dc:creator><![CDATA[blackjack]]></dc:creator>
		<pubDate>Fri, 18 Jun 2021 19:36:46 +0000</pubDate>
				<category><![CDATA[3C資訊]]></category>
		<category><![CDATA[Tools]]></category>
		<category><![CDATA[apache]]></category>
		<category><![CDATA[check]]></category>
		<category><![CDATA[nginx]]></category>
		<category><![CDATA[Server]]></category>
		<category><![CDATA[TLS]]></category>
		<category><![CDATA[TLS 1.2]]></category>
		<category><![CDATA[TLS 1.3]]></category>
		<category><![CDATA[小編推工具-線上檢測伺服器TLS支援版本]]></category>
		<category><![CDATA[檢測]]></category>
		<category><![CDATA[測試]]></category>
		<category><![CDATA[驗證]]></category>
		<guid isPermaLink="false">https://ailog.tw/lifelog/?p=9582</guid>

					<description><![CDATA[小編今天遇到鬼打牆的事情，半夜被叫起來檢測伺服器(Server)TLS的版本，老天啊，為了避免這種打擾我清夢的 &#8230; <p class="link-more"><a href="https://ailog.tw/lifelog/2021/06/19/tls-check/" class="more-link">閱讀全文<span class="screen-reader-text">〈小編推工具-線上檢測伺服器TLS支援版本〉</span></a></p>]]></description>
										<content:encoded><![CDATA[<p><span style="font-size: 14pt; font-family: verdana, geneva;">小編今天遇到鬼打牆的事情，半夜被叫起來檢測伺服器(Server)TLS的版本，老天啊，為了避免這種打擾我清夢的狀況，一定要大力推薦這個線上檢測TLS版本狀況的工具給大家。<span id="more-9582"></span></span></p>
<p><span style="font-size: 14pt; font-family: verdana, geneva;"><strong>官方網址：</strong></span><br />
<span style="font-size: 14pt; font-family: verdana, geneva;"><a href="https://testtls.com/">https://testtls.com/</a><br />
</span></p>
<p><span style="font-size: 14pt; font-family: verdana, geneva;"><strong>TLS的檢測種類：</strong></span><br />
<span style="font-size: 14pt; font-family: verdana, geneva;">TLS檢測工具有分為「使用者(clinet)」端、「伺服器(Server)」端兩種，小編今天要介紹的是「伺服器(Server)」端的TLS檢測情境。<br />
※如果需要檢測Clinet瀏覽器支援TLS的版本狀況，請參考小編的另一篇文章。<br />
<a href="https://ailog.tw/lifelog/2021/05/27/xp-2003-tls12/">https://ailog.tw/lifelog/2021/05/27/xp-2003-tls12/</a><br />
</span></p>
<p><span style="font-size: 14pt; font-family: verdana, geneva;"><strong>[檢測操作步驟]</strong></span><br />
<span style="font-size: 14pt; font-family: verdana, geneva;">01、透過瀏覽器連線至testtls官網，<a href="https://testtls.com/">https://testtls.com/</a></span><br />
<span style="font-size: 14pt; font-family: verdana, geneva;"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-9583" src="https://ailog.tw/lifelog/wp-content/uploads/2021/06/tlstest-01.png" alt="" width="847" height="334" srcset="https://ailog.tw/lifelog/wp-content/uploads/2021/06/tlstest-01.png 847w, https://ailog.tw/lifelog/wp-content/uploads/2021/06/tlstest-01-300x118.png 300w, https://ailog.tw/lifelog/wp-content/uploads/2021/06/tlstest-01-768x303.png 768w" sizes="auto, (max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></span></p>
<p><span style="font-size: 14pt; font-family: verdana, geneva;">02、輸入要檢測的網址，本範例輸入「http://www.google.com.tw」</span><br />
<span style="font-size: 14pt; font-family: verdana, geneva;">※如下圖檢測出來的結果是支援<span style="color: #ff0000;">TLS 1.2</span>及<span style="color: #ff0000;">TLS 1.3</span></span><br />
<span style="font-size: 14pt; font-family: verdana, geneva;"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-9587" src="https://ailog.tw/lifelog/wp-content/uploads/2021/06/tlstest-02.png" alt="" width="780" height="701" srcset="https://ailog.tw/lifelog/wp-content/uploads/2021/06/tlstest-02.png 780w, https://ailog.tw/lifelog/wp-content/uploads/2021/06/tlstest-02-300x270.png 300w, https://ailog.tw/lifelog/wp-content/uploads/2021/06/tlstest-02-768x690.png 768w" sizes="auto, (max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px" /></span></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>FreeBSD如何讓網頁執行需要root權限的script</title>
		<link>https://ailog.tw/lifelog/2020/12/26/freebsd-web-root/</link>
		
		<dc:creator><![CDATA[blackjack]]></dc:creator>
		<pubDate>Sat, 26 Dec 2020 07:01:22 +0000</pubDate>
				<category><![CDATA[3C資訊]]></category>
		<category><![CDATA[FreeBSD]]></category>
		<category><![CDATA[apache]]></category>
		<category><![CDATA[freebsd]]></category>
		<category><![CDATA[FreeBSD如何讓網頁執行需要root權限的script]]></category>
		<category><![CDATA[root]]></category>
		<category><![CDATA[script]]></category>
		<category><![CDATA[sudo]]></category>
		<category><![CDATA[visudo]]></category>
		<category><![CDATA[web]]></category>
		<category><![CDATA[www]]></category>
		<guid isPermaLink="false">https://ailog.tw/lifelog/?p=5641</guid>

					<description><![CDATA[小編遇到了一個案例，需要透過網頁來執行需要root才可以運作的script，當下當然覺得這是非常危險的動作，溝 &#8230; <p class="link-more"><a href="https://ailog.tw/lifelog/2020/12/26/freebsd-web-root/" class="more-link">閱讀全文<span class="screen-reader-text">〈FreeBSD如何讓網頁執行需要root權限的script〉</span></a></p>]]></description>
										<content:encoded><![CDATA[<p>小編遇到了一個案例，需要透過網頁來執行需要root才可以運作的script，當下當然覺得這是非常危險的動作，溝通過後了解到對方是在要企業的內部系統網頁執行，好吧!今天小編就來分享如何透過web程式去執行需要root才可以執行的script。<span id="more-5641"></span></p>
<p>一、作業系統情境：<br />
FreeBSD</p>
<p>二、安裝Sudo軟體：<br />
(1)、透過pkg安裝：<br />
<span style="font-weight: 400;">pkg install </span><span style="font-weight: 400;">sudo</span></p>
<p>(2)、透過ports安裝：<br />
<span style="font-weight: 400;">cd /usr/ports/security/sudo<br />
</span><span style="font-weight: 400;">make &amp;&amp; make install<br />
</span></p>
<p>三、設定權限<br />
<span style="font-weight: 400;">在命令提示字元下輸入「visudo」<br />
</span>在文件的最下面新增新增要賦予的權限及程式</p>
<p>範例一：<br />
www ALL=NOPASSWD:/var/carddata/md5check.sh</p>
<p>範例二：<br />
apache ALL=NOPASSWD:/var/carddata/md5check.sh</p>
<p>注意事項：<br />
設定時最前方是要用www或apache得看系統是用哪一個帳號來運作web server。</p>
<p>&nbsp;</p>
<p><span style="font-weight: 400;"> </span></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Apache 2.X 啟動網頁認證</title>
		<link>https://ailog.tw/lifelog/2019/10/02/apache-2-x-auth/</link>
		
		<dc:creator><![CDATA[blackjack]]></dc:creator>
		<pubDate>Wed, 02 Oct 2019 12:31:50 +0000</pubDate>
				<category><![CDATA[3C資訊]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[apache]]></category>
		<category><![CDATA[apache2]]></category>
		<category><![CDATA[auth]]></category>
		<category><![CDATA[htpasswd]]></category>
		<category><![CDATA[密碼]]></category>
		<category><![CDATA[帳號]]></category>
		<category><![CDATA[登入]]></category>
		<category><![CDATA[認證]]></category>
		<category><![CDATA[驗證]]></category>
		<guid isPermaLink="false">https://ailog.tw/lifelog/?p=1075</guid>

					<description><![CDATA[Apache除了是老牌的web server之外，也內建了簡易的網頁認證機制，下面就來介紹如何快速啟動htpa &#8230; <p class="link-more"><a href="https://ailog.tw/lifelog/2019/10/02/apache-2-x-auth/" class="more-link">閱讀全文<span class="screen-reader-text">〈Apache 2.X 啟動網頁認證〉</span></a></p>]]></description>
										<content:encoded><![CDATA[<p>Apache除了是老牌的web server之外，也內建了簡易的網頁認證機制，下面就來介紹如何快速啟動htpasswd的驗證機制吧!<span id="more-1075"></span></p>
<p>小編的系統環境如下：<br />
作業系統：Ubuntu 16.04.5 LTS<br />
Apache：2.4.18</p>
<p><strong>一、變更Apache設定檔</strong><br />
sudo vi /etc/apache2/sites-enabled/000-default.conf<br />
在設定檔裡最下方加入<br />
&lt;Directory &#8220;/var/www/html&#8221;&gt;<br />
AuthType Basic<br />
AuthName &#8220;login System&#8221;<br />
AuthUserFile /etc/apache2/userpwd/.htpasswd<br />
Require valid-user<br />
&lt;/Directory&gt;<br />
<img loading="lazy" decoding="async" class="alignnone wp-image-1077 size-full" src="https://ailog.tw/lifelog/wp-content/uploads/2019/10/apache-auth-01.png" alt="" width="491" height="277" srcset="https://ailog.tw/lifelog/wp-content/uploads/2019/10/apache-auth-01.png 491w, https://ailog.tw/lifelog/wp-content/uploads/2019/10/apache-auth-01-300x169.png 300w" sizes="auto, (max-width: 491px) 100vw, 491px" /></p>
<p>設定檔參數說明：<br />
Directory &#8220;/var/www/html&#8221;：該路徑是你希望有帳號密碼驗證的路徑。<br />
AuthUserFile /etc/apache2/userpwd/.htpasswd：使用者帳號密碼檔案存放的路徑。<br />
AuthName &#8220;login System&#8221;：網頁出現驗證畫面時的名稱。</p>
<p><strong>二、重新啟動Apache服務</strong><br />
sudo service apache2 restart<br />
<img loading="lazy" decoding="async" class="alignnone wp-image-1079 size-full" src="https://ailog.tw/lifelog/wp-content/uploads/2019/10/apache-auth-03.png" alt="" width="458" height="98" srcset="https://ailog.tw/lifelog/wp-content/uploads/2019/10/apache-auth-03.png 458w, https://ailog.tw/lifelog/wp-content/uploads/2019/10/apache-auth-03-300x64.png 300w" sizes="auto, (max-width: 458px) 100vw, 458px" /></p>
<p><strong>三、建立使用者帳號密碼</strong><br />
將下方指令裡面的帳號密碼變更成你所要建立的資訊，接著在Linux命令提示字元下執行即可。<br />
sudo sh -c &#8220;echo -n &#8216;123456:&#8217; &gt;&gt; /etc/apache2/userpwd/.htpasswd&#8221;;echo 654321 &gt; /tmp/pw.txt ;sudo sh -c &#8220;openssl passwd -apr1 -in /tmp/pw.txt &gt;&gt; /etc/apache2/userpwd/.htpasswd&#8221;;rm -rf /tmp/pw.txt<br />
<img loading="lazy" decoding="async" class="alignnone wp-image-1078 size-full" src="https://ailog.tw/lifelog/wp-content/uploads/2019/10/apache-auth-02.png" alt="" width="754" height="156" srcset="https://ailog.tw/lifelog/wp-content/uploads/2019/10/apache-auth-02.png 754w, https://ailog.tw/lifelog/wp-content/uploads/2019/10/apache-auth-02-300x62.png 300w" sizes="auto, (max-width: 706px) 89vw, (max-width: 767px) 82vw, 740px" /><br />
指令說明：<br />
(1)、下面的指令是建立一個123456的帳號，密碼為654321，並將該資訊寫入「/etc/apache2/userpwd/.htpasswd」這個檔案。<br />
(2)、請注意「/etc/apache2/userpwd/.htpasswd」這個路徑必須與上面的相呼應。</p>
<p><strong>四、驗證</strong><br />
登入你剛剛設定的網頁路徑應該又可以看到下方的驗證畫面。<br />
<img loading="lazy" decoding="async" class="alignnone wp-image-1076 size-full" src="https://ailog.tw/lifelog/wp-content/uploads/2019/10/apache-auth.png" alt="" width="425" height="252" srcset="https://ailog.tw/lifelog/wp-content/uploads/2019/10/apache-auth.png 425w, https://ailog.tw/lifelog/wp-content/uploads/2019/10/apache-auth-300x178.png 300w" sizes="auto, (max-width: 425px) 100vw, 425px" /></p>
<p>&nbsp;</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
