Solved

Any Apache Gurus Out There?

Posted on 2009-07-11
3
219 Views
Last Modified: 2012-05-07
Can't seem to get any answers at all. Anyone familiar with Apache out there?

Module load order in Apache 2 is not working at all. Mod_Rewrite is running before Mod_Security2. I need Mod_Rewrite to run after Mod_Security
0
Comment
Question by:dilithiumtoys
3 Comments
 
LVL 14

Expert Comment

by:Deepak Kosaraju
ID: 24834811
Can you copy and paste you config. Apache file is read top - bottom so make sure u change you sequence.
0
 
LVL 43

Accepted Solution

by:
ravenpl earned 500 total points
ID: 24834857
Under 1.3 apache, last loaded module is called first,
Under 2.0 order of modules is unpredictable, which was considered mis-feature, and is fixed in 2.2. Not really though. Under 2.2 modules are registering itself under given class (like Auth module), but still, within one class the order is quite random.
0
 

Author Comment

by:dilithiumtoys
ID: 24834901
Thank you to everyone for the suggestions. I have solved this problem, but I am running on Apache 2 for clarity.

I was attempting to feed Mod Rewrite a variable that was created by a custom module. As ravenpl said, it is very unpredictable, which was exhausting.

I was able to do what I wanted to do by causing redirection from with in the custom module.
0

Featured Post

Active Directory Webinar

We all know we need to protect and secure our privileges, but where to start? Join Experts Exchange and ManageEngine on Tuesday, April 11, 2017 10:00 AM PDT to learn how to track and secure privileged users in Active Directory.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
PHP Curl Multi-exec 13 72
How can I write .htaccess code to redirect 301 pages? 1 126
Cpanel file manager 8 42
DNS CNAME records visibility on a web server 2 13
Introduction As you’re probably aware the HTTP protocol offers basic / weak authentication, which in combination with the relevant configuration on your web server, provides the ability to password protect all or part of your host.  If you were not…
In Solr 4.0 it is possible to atomically (or partially) update individual fields in a document. This article will show the operations possible for atomic updating as well as setting up your Solr instance to be able to perform the actions. One major …
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…

831 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question