Chapter 6. Security

Table of Contents
Overview
Threaded model
Controlling Served Documents
Configuration File
Connection Timeouts
Unix domain sockets

Overview

 

The only truly secure system is one that is powered off, cast in a block of concrete and sealed in a lead-lined room with armed guards -- and even then I have my doubts.

 
--Eugene H. Spafford 

What follows are rough guidelines and information that will help you evaluate phhttpd for use in a secure environment.