This module requires the service of
Thus, in order to get the ability of handling FTP proxy requests,
Do not enable proxying until you have secured your server. Open proxy servers are dangerous both to your network and to the Internet at large.
You probably don't have that particular file type defined as
application/octet-stream
in your proxy's mime.types
configuration file. A useful line can be
application/octet-stream bin dms lha lzh exe class tgz taz
Alternatively you may prefer to default everything to binary:
In the rare situation where you must download a specific file using the
FTP ASCII
transfer method (while the default transfer is in
binary
mode), you can override ;type=a
to force an
ASCII transfer. (FTP Directory listings are always executed in ASCII mode,
however.)
Currently, only GET is supported for FTP in mod_proxy. You can of course use HTTP upload (POST or PUT) through an Apache proxy.
An FTP URI is interpreted relative to the home directory of the user
who is logging in. Alas, to reach higher directory levels you cannot
use /../, as the dots are interpreted by the browser and not actually
sent to the FTP server. To address this problem, the so called Squid
%2f hack was implemented in the Apache FTP proxy; it is a
solution which is also used by other popular proxy servers like the Squid Proxy Cache. By
prepending /%2f
to the path of your request, you can make
such a proxy change the FTP starting directory to /
(instead
of the home directory). For example, to retrieve the file
/etc/motd
, you would use the URL:
To log in to an FTP server by username and password, Apache uses different strategies. In absence of a user name and password in the URL altogether, Apache sends an anonymous login to the FTP server, i.e.,
This works for all popular FTP servers which are configured for anonymous access.
For a personal login with a specific username, you can embed the user name into the URL, like in:
If the FTP server asks for a password when given this username (which
it should), then Apache will reply with a 401
(Authorization
required) response, which causes the Browser to pop up the
username/password dialog. Upon entering the password, the connection
attempt is retried, and if successful, the requested resource is
presented. The advantage of this procedure is that your browser does not
display the password in cleartext (which it would if you had used
in the first place).
The password which is transmitted in such a way is not encrypted on its way. It travels between your browser and the Apache proxy server in a base64-encoded cleartext string, and between the Apache proxy and the FTP server as plaintext. You should therefore think twice before accessing your FTP server via HTTP (or before accessing your personal files via FTP at all!) When using insecure channels, an eavesdropper might intercept your password on its way.
In order to allow both browsing the directories on an FTP server and downloading files, Apache looks at the request URL. If it looks like a directory, or contains wildcard characters ("*?[{~"), then it guesses that a listing is wanted instead of a download.
You can disable the special handling of names with wildcard characters.
See the
The
The
Set to "off" to allow downloading files with wildcards in their names from FTP servers that don't understand wildcard escaping.
The