From 6831139043d15faaec6590397f4260097e417408 Mon Sep 17 00:00:00 2001
From: Luca Toscano Strict
option. Due to legacy modules, applications or
- custom user-agents which must be deperecated the Unsafe
+ custom user-agents which must be deprecated the Unsafe
option has been added to revert to the legacy behaviors. These rules
are applied prior to request processing, so must be configured at the
global or default (first) matching virtual host section, by IP/port
@@ -1294,7 +1294,7 @@ EnableSendfile On
RFC 7230 §3.5 "Message Parsing Robustness" identify the
risks of accepting obscure whitespace and request message formatting.
- As of the introduction of this directive, all grammer rules of the
+ As of the introduction of this directive, all grammar rules of the
specification are enforced in the default Strict
operating
mode, and the strict whitespace suggested by section 3.5 is enforced
and cannot be relaxed.
RFC 2616 §19.6 "Compatibility With Previous Versions" had
encouraged HTTP servers to support legacy HTTP/0.9 requests. RFC 7230
- superceeds this with "The expectation to support HTTP/0.9 requests has
+ supersedes this with "The expectation to support HTTP/0.9 requests has
been removed" and offers additional comments in
RFC 7230 Appendix A. The HTTP Methods that are not conforming to the relvant RFCs are normally
+ HTTP Methods that are not conforming to the relevant RFCs are normally
rejected by request processing in Apache HTTPD. To avoid this, modules
can register non-standard HTTP methods they support.
The Require1.0
option allows
@@ -4923,7 +4923,7 @@ hostname or IP address