absolute path | A path that begins with a slash (/). It is interpreted to begin in the host's top-level directory. |
access path | The restriction of access to network realms, usually by permitting access by a discrete set of hosts or users and denying it to all others. |
algorithm | An unambiguous formula or set of rules of solving a finite number of steps. Algorithms for encryption are called ciphers. |
Apache | A free UNIX Web server which forms the core of the Stronghold server. See Apache HTTPD Server Project site at http://www.apache.org |
authentication | The positive identification of a network entity as a server, a client or a user. |
| |
CA certificate | A certificate containing a Certification Authority's (CA) public key. Network entities use this public key to verify certificates signed with the CA's private key. |
certificate | A file used for authenticating network entities under the SSL protocol. A certificate contains information about its owner (called the subject) and its issuer, plus the owner's public key and a signature made by a Certification Authority (CA). Network entities verify these signatures using CA certificates. |
certificate signing request (CSR) | An unsigned certificate for submission to a Certification Authority, which signs it with its private key. Once the CSR is signed, it becomes a certificate. |
Certification Authority (CA) | A trusted third party whose purpose is to sign certificates for network entities it has authenticated using secure means. Other network entities can check the signature to verify that a CA has authenticated the bearer of a certificate. |
child process | A subordinate process started by a parent process. |
cipher | A system of encryption. |
ciphertext | |
client certificate | A certificate authenticating a network client and signed by a Certification Authority (CA). It contains the client's public key. |
comment out | To prefix one or more lines with a hash mark (#), marking it for omission from processing, compilation, and interpretation. When Stronghold reads a file, it skips any lines that are commented out. |
Common Gateway Interface (CGI) | A standard interface between a Web server and other programs. |
Configuration | The file that configures Stronghold's Makefile. It contains the parameters used to compile the server. |
configuration file | The <ServerRoot>/conf/httpd.conf file, which contains the parameters that control Stronghold's behaviour. |
CONNECT | A proxying protocol under TCP/IP. It can be used to encapsulate other protocols, such as the SSL proxy protocol. |
container | A pair of configuration delimiters specifying an object on the server. Directives pertaining to the object go inside the container, between the opening and closing delimiters |
content negotiation | The negotiation of file format or language between client and server. Clients and servers can rank formats and languages in order of preference, then negotiate for the most desirable version. |
cryptanalysis | The analysis of ciphers for the purpose of evaluating their security, usually by attempting to break them |
cryptography | The study and practice of encoding data so that it can only be decoded by specific users. Systems of encoding and decoding are called ciphers. |
| |
decryption | the conversion of encrypted information ( ciphertext) to its original, readable form (plaintext). |
denial-of-service attack | A network attack created by flooding a host with data. When a server's resources are occupied by such and attack, legitimate requests may be denied. If the rate and volume of data reach a certain level, the server program may crash. |
digest | A hash of a message, which can be used to verify that the contents of the message have not been altered in transit. |
directive | A configuration command that controls one or more aspects of a program's behaviour. |
Domain Naming System (DNS) | A distributed system for resolving fully-qualified domain names into IP numbers. |
| |
encryption | The encoding of data in order to hide its content from everyone except its intended viewer. Encryption converts readable data ( plaintext) into a seemingly random sequence of characters ( ciphertext). |
export-crippled | diminished in cryptographic strength (and security) in order to comply with the United States' Export Administration Regulations (EAR). Export-crippled cryptographic software is limited to a small key size, resulting in ciphertext which can be decrypted by brute force. |
| |
firewall | A dedicated gateway computer that holds no sensitive data. The firewall intercepts and filters incoming data packets in order to block direct access to internal computer systems. |
FTP | The File Transfer Protocol, a client-server protocol that allows a user to transfer files to and from a server over a TCP/IP network. |
fully-qualified domain name | The unique name of a network entity, consisting of a hostname and a domain name that can resolve to an IP address. For example, "www" is a hostname, "c2.net" is a domain name, and "www.c2.net" is a fully-qualified domain name. |
| |
handler | An aspect of the server that handles requests. |
hash | A smaller number produced using a deterministic function and a large input. Also known as a digest, it is used to verify that the content of a message is intact after transfer. |
host | A networked computer that provides services that other computers or terminals can access. |
hostname | A unique name that identifies a single host within a network domain. |
HTTP | The Hypertext Transport Protocol, the standard protocol of the World Wide Web. |
httpd.conf | The Stronghold runtime configuration file, containing directives which the server reads on startup. |
HTTPS | The Hypertext Transport Protocol, Secure, the standard SSl communication mechanism of the World Wide Web. |
| |
IP number | A 32-bit, dotted decimal address, such as 204.17.233.16, that uniquely identifies a network domain and is usually bound to a fully-qualified domain name. |
| |
keepalive | A server feature which keeps a TCP connection open after an initial request in order to fulfill subsequent requests. keepalive eliminates the server overhead normally required to open and close an individual connection for each request. |
Key | A file containing the value that must be fed into an algorithm in order to encrypt or decrypt a message. |
key pair | A set of two keys used in public key cryptography. One is the public key used to encrypt the data. the other is the private key necessary to decrypt data that has been encrypted with the public key. |
| |
License key | A string of colon-separated, hexidecimal values that Stronghold Web Server reads on startup to verify that the server software is licensed for the host on which it runs. |
local-area network (LAN) | A private group of computers and related peripheral devices that are connected and capable of sharing resources. A LAN may or may not be connected to the Internet. |
| |
make | The UNIX tool that compiles the Stronghold server binary based on instructions in the Makefile. |
Makefile | A file containing instructions that tell make how to compile Stronghold, taking into account the interdependencies of modules and their modifications times. |
metainformation | Information about information. Metaininformation may include descriptive information about the size, format, or other characteristics of a client request, server response, or a document being transferred. |
MIME | (Multipurpose Internet Mail Extensions). A standard for providing metaininformation about documents on the Internet, including non-textual data. |
| |
parent process | An original, controlling process i a group of related processes. The process it spawns are called child processors or children |
pass phrase | The word or phrase that authenticates the user who is authorized to start Stronghold. The pass phrase prevents unauthorized users from starting, restarting, or reconfiguring the server. |
permission | An access privilege associated with a file or directory, indicating who can use it and how. |
plaintext | Readable, unencrypted data. |
PHP | personal home Page, and HTML-embedded scripting language originally designed for simple home page development. PHP has evolved to become an extended scripting language capable of substituting for CGI and SSI. |
platform | An operating system environment and the hardware that supports it. |
private key | The secret key in a key pair, used to decrypt incoming messages and sign outgoing ones. |
process | In a multitasking environment such as UNIX, one instance of an executing program. The original instance of a program is called the parent process, and it may start one or more child processes. |
proxy server | A server that relays requests and responses between clients and other servers. |
public key | The publicly available key in a key pair, used to encrypt messages bound for its owner and to decrypt signatures made by its owner. |
public key cryptography | The study and application of asymmetric encryption systems, which use one key for encryption and another for decryption. A corresponding pair of such keys constitutes a key pair. |
| |
relative path | A partial path that does not begin with a slash (/). It is interpreted as relative to the current directory. |
request | A message sent from a client to a server requesting one or more server resources. |
response | A message sent from a server to a client in relation to a request. A response may contain the requested resources, or it may contain additional information pertaining to the request. |
root | The superuser of a UNIX system, a special user with unlimited access to all files, directories and commands. |
| |
Secure Sockets Layer (SSL) | A protocol created by Netscape Communications Corporation for authentication and encryption over TCP/IP networks, including the Web. |
ServerRoot | The path to the top-level Stronghold directory. In this manual <ServerRoot> is always a variable; substitute the actual path. |
server-side includes (SSIs) | HTML-embedded commands executed by the server before sending the HTML file to the client. |
session | A series of two or more related transactions between a client and a server. A session ends when the client quits or the session identifier expires. |
signature | An encrypted text block that validates a certificate or other file. A Certification Authority (CA) creates a signature by generating a hash of the public key embedded in a certificate. Only the CA's public key can decrypt the signature, verifying that the CA has authenticated the network entity that owns the certificate. |
site certificate | A certificate authenticating a network host or virtual host and signed by a Certification Authority (CA). A site certificate contains the site's public key. |
source | One or more text files, written in a programming language, which can be compiled to form one or more binary files. |
SSleay | |
status code | A numerical code denoting the status of a client request response. |
SWISH | Simple Web Indexing System for Humans, Stronghold's standalone site-indexing program, located in the <ServerRoot>/SWISH directory. |
symmetric cryptography | The study and application of ciphers that use a single key for both encryption and decryption operations. |
| |
TCP/IP | Transmission Control Protocol/Internet Protocol, the suite of standard Internet protocols upon which HTTP, HTTPS, FTP, TELENET, and GOPHER are based. |
Transport Layer Security (TLS) | A protocol for authentication and encryption over TCP/IP networks, including the Web. TLS is the successor to SSL version 3.0 and is nearly identical. It is being standardizing by the Internet Engineering Task Force. |
| |
uncomment | To remove the hash marks (#) that comment out, or neutralize, one or more lines of text. Programs read a line within a file only if it is uncommented. |
| |
virtual host | A domain that shares a host with other domains. |
| |
WWWWAIS | Stronghold's stand-alone search gateway, which searches site index files created by SWISH. |
| |
x.509 | An authentication certificate scheme recommended by the International Telegraph and Telephone Consultive Committee and used in SSL authentication. |