Search     or:     and:
 File managers 
Последние статьи :
  Тренажёр 16.01   
  Эльбрус 05.12   
  Алгоритмы 12.04   
  Rust 07.11   
  Go 25.12   
  EXT4 10.11   
  FS benchmark 15.09   
  Сетунь 23.07   
  Trees 25.06   
  Apache 03.02   
TOP 20
 Part 4...2108 
 Linux Kernel 2.6...1715 
 UML 3...1714 
 Nmap-> Сканирова...1714 
 AT&T Tutorial...1713 
 Go Web ...1713 
 Linux Inline Assembly...1713 
 Специальные м...1713 
 Easy Forum...1713 
 2.4 ->2.6...1713 
 Erlang 3...1713 
 Linux Assembler Tutorial...1713 
  01.01.2024 : 3621733 посещений


 TUX-Integrated Kernel-based Application Protocols Layer and Object Cache
 Copyright (C) 2000, 2001 Red Hat, Inc.
 Licensed under the terms of the GNU General Public License
 1. Introduction
    TUX -  http-daemon (webserver) for Linux. TUX is different from other
    webservers in that it runs partially from within the Linux-kernel as a
    module (device driver).  Given sufficiently-capable networking cards,
    it enables direct scatter-gather DMA and hardware-based TCP/IP
    checksumming from the page cache directly to the network, avoiding
    extra data copies.
    TUX handles static pages directly, and can work in concert with
    kernel modules, user-space modules, and regular user-space
    web server daemons to provide dynamic content.  Regular user-space
    daemons do not need to be altered in any way for TUX to use them
    to provide content, but in order for TUX to cache dynamic content,
    user-space code has to use a new interface based on the tux(2)
    system call.
    Static web pages are not a very complex thing to serve, but these are
    very important nevertheless, since virtually all images are static,
    and a large portion of the html pages are static also. A "regular"
    webserver has little added value for static pages; it is simply a
    "copy file to network" operation.  This can be done very efficiently
    from within the Linux kernel; for example, the nfs (network file system)
    daemon performs a similar task and also runs in the kernel.
    But dynamic content is becoming a larger and larger part of the
    web, and TUX provides a way to cache dynamic content as well.
    TUX modules (which can be build in kernel space or in user space;
    user space is recommended) can create "objects" which are stored
    using the page cache.  To respond to a request for dynamic data, a
    TUX module can send a mix of dynamically-generated data and cached
    pre-generated objects, taking maximal advantage of TUX's zero-copy
    architecture.  (Kernel-space modules are currently the only modules
    capable of making use of TUX's SSI support; that will change in the
    This completely new architecture for providing dynamic content
    requires a new API.  Existing standard APIs for CGI are not
    sufficient to be mapped to TUX's API.  This means that existing
    CGI applications must be re-coded in order to take advantage of
    TUX's architecture.  TUX can, however, call CGI programs via
    its CGI module, so you can choose to convert only programs that
    need TUX's speed to the TUX api and run other programs using
    the standard CGI interface.  TUX can also redirect requests
    to another webserver, such as Apache, so on a single site, you
    can mix and match static content, TUX modules, old-style CGIs,
    and programs written to other webservers' APIs.
    Whenever TUX isn't sure what to do (that is, encounters input
    that it is not prepared to handle), it always redirects the
    request to Apache to handle in an RFC-compliant manner.
    Note: This document sometimes uses "Apache" instead of "any webserver
    you might ever want to use", just for reasons of readability.
 2. Quick Start  
    1) Build a kernel with tux support built in or as a module (if
    2) Configure the tux subsystem via /proc/sys/net/tux/* (or sysctl
    3) Start the tux(8) daemon
    4) Stop tux with the tux(8) program with the --stop option
    N.B. Your distribution may include a /etc/rc.d/init.d/tux script;
    if so, your distribution's documentation overrides this.
 3. Configuration 
    Modes of operation
    There is one recommended mode of operation:
    1) TUX is main webserver, "Apache" is assistant running on port 8080
       (or whatever):
 	clientport   -> 8080 (or whatever)
  	serverport   -> 80
    There is one less useful mode of operation:
    2) "Apache" is main webserver, TUX is assistant
 	clientport   -> 80
   	serverport   -> 8080 (or whatever)
    Configuring TUX
    Before you can start using TUX, you have to configure it. This
    is done through the /proc filesystem, and can thus be done from inside
    a script. Most parameters can only be set when TUX is not active.
    The following things need configuration:
    1) The port where TUX should listen for requests
    2) The port (on "localhost") where "Apache" is listening
    3) The location of the documents (documentroot)
    It is very important that the documentroot for TUX matches the
    documentroot for the userspace-daemon, as TUX might "redirect"
    any request to this userspace-daemon.
    A typical script (for the first mode of operation) to do this would 
    look like:
 	modprobe tux
 	echo 8080 > /proc/sys/net/tux/clientport
 	echo 80 > /proc/sys/net/tux/serverport
 	echo /var/www > /proc/sys/net/tux/documentroot
    For the second mode of operation, this would be:
 	modprobe tux
 	echo 80 > /proc/sys/net/tux/clientport
 	echo 8080 > /proc/sys/net/tux/serverport
 	echo /var/www > /proc/sys/net/tux/documentroot
    If the clientport is 8080, you also have to change the configuration of the 
    userspace daemon. For Apache, you do this by changing
    Port 80
    Port 8080
 in /etc/apache/conf/httpd.conf. For security reasons, you can also change 
    BindAddress *
    (in the same file) to prevent outside users from accessing Apache 
    directly. Only do this if TUX is the main webserver.
    Instead of echoing numbers directly into /proc/sys/net/tux/*,
    use /etc/sysctl.tux (/etc/sysctl.conf entries are read before
    the tux module is loaded).  For example,
 	echo 8080 > /proc/sys/net/tux/clientport
    becomes a line in /etc/sysctl.tux like
 	net.tux.clientport = 8080
    For each CGI program you have (under $DOCROOT/cgi-bin/ by default),
    there must be a corresponding file under $DOCROOT (not in the cgi-bin
    directory) to tell TUX that it has permission to run the CGI program.
    So for TUX to run $DOCROOT/cgi-bin/foo/bar/xx, $DOCROOT/foo/bar/xx must
    exist and have the permissions specified in mode_cgi.  The file
    $DOCROOT/foo/bar/xx must, of course, be executable.
    Stopping TUX
    In order to change the configuration, you should stop TUX by running
    "/etc/rc.d/init.d/tux stop" at a command prompt.
    If this doesn't work fast enough for you (the commands above can wait for 
    a remote connection to close down), you can send the daemons a "HUP"
    signal after you told them to stop, using "killall -HUP tux". This will
    cause the daemon-threads to stop immediately. 
    Note that the daemons will restart immediately if they are not told to
 4. Permissions
    The security model of TUX is very strict. It can be, since there is a 
    userspace daemon that can handle the complex exceptions. 
    TUX only serves a file if
 	1)  There is no "?" in the URL
 	2)  The URL starts with a "/"
 	3)  The file indicated by the URL exists
 	4)  The file is world-readable (*)
 	5)  The file is not a directory, executable or has the Sticky-bit
 	    set (*)
 	6)  The URL doesn't contain any "forbidden" substrings such as ".."
 	    and "cgi-bin" (*)
 	7)  The mime-type is known (*)
    The items marked with a (*) are configurable through the
    sysctl-parameters in /proc/sys/net/tux.
    In all cases where any of the above conditions isn't met, the
    userspace-daemon is handed the request.
 5. Parameters
    The following parameters are settable through /proc/sys/net/tux:
    (Permissions are set via hexadecimal values, not the symbolic values
    shown here for maximum clarity)
 	Name		Default		Description
 	serverport	80		The port where TUX listens on
 	clientport	8080		The port of the userspace
 	threads		2		The number of server-threads.
 	documentroot	/var/www	the directory where the
 					document-files are
 	perm_required	S_IROTH		Minimum permissions required
 					(for values see "man 2 stat")
 	perm_forbid	dir+sticky+	Permission mask with "forbidden"
 			execute		permissions.
 					(for values see "man 2 stat")
 	mode_cgi	S_IXUGO		Permission mask for CGI permision
 	maxconnect	1000		Maximum number of concurrent
Оставьте свой комментарий !

Ваше имя:
Оба поля являются обязательными

 Автор  Комментарий к данной статье