Upgrading to 2.4 from 2.2 (original) (raw)

Compile-Time Configuration Changes

The compilation process is very similar to the one used in version 2.2. Your old configure command line (as found in build/config.nice in the installed server directory) can be used in most cases. There are some changes in the default settings. Some details of changes:

Run-Time Configuration Changes

There have been significant changes in authorization configuration, and other minor configuration changes, that could require changes to your 2.2 configuration files before using them for 2.4.

Authorization

Any configuration file that uses authorization will likely need changes.

You should review the Authentication, Authorization and Access Control Howto, especially the sectionBeyond just authorization which explains the new mechanisms for controlling the order in which the authorization directives are applied.

Directives that control how authorization modules respond when they don't match the authenticated user have been removed: This includes AuthzLDAPAuthoritative, AuthzDBDAuthoritative, AuthzDBMAuthoritative, AuthzGroupFileAuthoritative, AuthzUserAuthoritative, and AuthzOwnerAuthoritative. These directives have been replaced by the more expressive [RequireAny](./mod/mod%5Fauthz%5Fcore.html#requireany), [RequireNone](./mod/mod%5Fauthz%5Fcore.html#requirenone), and[RequireAll](./mod/mod%5Fauthz%5Fcore.html#requireall).

If you use [mod_authz_dbm](./mod/mod%5Fauthz%5Fdbm.html), you must port your configuration to use Require dbm-group ... in place of Require group ....

Access control

In 2.2, access control based on client hostname, IP address, and other characteristics of client requests was done using the directives [Order](./mod/mod%5Faccess%5Fcompat.html#order), [Allow](./mod/mod%5Faccess%5Fcompat.html#allow), [Deny](./mod/mod%5Faccess%5Fcompat.html#deny), and [Satisfy](./mod/mod%5Faccess%5Fcompat.html#satisfy).

In 2.4, such access control is done in the same way as other authorization checks, using the new module[mod_authz_host](./mod/mod%5Fauthz%5Fhost.html). The old access control idioms should be replaced by the new authentication mechanisms, although for compatibility with old configurations, the new module [mod_access_compat](./mod/mod%5Faccess%5Fcompat.html) is provided.

Mixing old and new directives

Mixing old directives like [Order](./mod/mod%5Faccess%5Fcompat.html#order), [Allow](./mod/mod%5Faccess%5Fcompat.html#allow) or [Deny](./mod/mod%5Faccess%5Fcompat.html#deny) with new ones like[Require](./mod/mod%5Fauthz%5Fcore.html#require) is technically possible but discouraged. [mod_access_compat](./mod/mod%5Faccess%5Fcompat.html) was created to support configurations containing only old directives to facilitate the 2.4 upgrade. Please check the examples below to get a better idea about issues that might arise.

Here are some examples of old and new ways to do the same access control.

In this example, there is no authentication and all requests are denied.

2.2 configuration:

Order deny,allow Deny from all

2.4 configuration:

Require all denied

In this example, there is no authentication and all requests are allowed.

2.2 configuration:

Order allow,deny Allow from all

2.4 configuration:

Require all granted

In the following example, there is no authentication and all hosts in the example.org domain are allowed access; all other hosts are denied access.

2.2 configuration:

Order Deny,Allow Deny from all Allow from example.org

2.4 configuration:

Require host example.org

In the following example, mixing old and new directives leads to unexpected results.

Mixing old and new directives: NOT WORKING AS EXPECTED

DocumentRoot "/var/www/html"

<Directory "/"> AllowOverride None Order deny,allow Deny from all

<Location "/server-status"> SetHandler server-status Require local

access.log - GET /server-status 403 127.0.0.1 error.log - AH01797: client denied by server configuration: /var/www/html/server-status

Why httpd denies access to servers-status even if the configuration seems to allow it? Because [mod_access_compat](./mod/mod%5Faccess%5Fcompat.html) directives take precedence over the [mod_authz_host](./mod/mod%5Fauthz%5Fhost.html) one in this configuration merge scenario.

This example conversely works as expected:

Mixing old and new directives: WORKING AS EXPECTED

DocumentRoot "/var/www/html"

<Directory "/"> AllowOverride None Require all denied

<Location "/server-status"> SetHandler server-status Order deny,allow Deny from all Allow From 127.0.0.1

access.log - GET /server-status 200 127.0.0.1

So even if mixing configuration is still possible, please try to avoid it when upgrading: either keep old directives and then migrate to the new ones on a later stage or just migrate everything in bulk.

In many configurations with authentication, where the value of theSatisfy was the default of ALL, snippets that simply disabled host-based access control are omitted:

2.2 configuration:

2.2 config that disables host-based access control and uses only authentication

Order Deny,Allow Allow from all AuthType Basic AuthBasicProvider file AuthUserFile /example.com/conf/users.passwd AuthName secure Require valid-user

2.4 configuration:

No replacement of disabling host-based access control needed

AuthType Basic AuthBasicProvider file AuthUserFile /example.com/conf/users.passwd AuthName secure Require valid-user

In configurations where both authentication and access control were meaningfully combined, the access control directives should be migrated. This example allows requests meeting both criteria:

2.2 configuration:

Order allow,deny Deny from all

Satisfy ALL is the default

Satisfy ALL Allow from 127.0.0.1 AuthType Basic AuthBasicProvider file AuthUserFile /example.com/conf/users.passwd AuthName secure Require valid-user

2.4 configuration:

AuthType Basic AuthBasicProvider file AuthUserFile /example.com/conf/users.passwd AuthName secure Require valid-user Require ip 127.0.0.1

In configurations where both authentication and access control were meaningfully combined, the access control directives should be migrated. This example allows requests meeting either criteria:

2.2 configuration:

Order allow,deny Deny from all Satisfy any Allow from 127.0.0.1 AuthType Basic AuthBasicProvider file AuthUserFile /example.com/conf/users.passwd AuthName secure Require valid-user

2.4 configuration:

AuthType Basic AuthBasicProvider file AuthUserFile /example.com/conf/users.passwd AuthName secure

Implicitly

Require valid-user Require ip 127.0.0.1

Other configuration changes

Some other small adjustments may be necessary for particular configurations as discussed below.

Third Party Modules

All modules must be recompiled for 2.4 before being loaded.

Many third-party modules designed for version 2.2 will otherwise work unchanged with the Apache HTTP Server version 2.4. Some will require changes; see the API update overview.

Common problems when upgrading