![](https://pdfstore-manualsonline.prod.a.ki/pdfasset/1/9a/19ab1210-0050-4318-af5a-ad707807fdfe/19ab1210-0050-4318-af5a-ad707807fdfe-bg17.png)
Chapter 4. Security
TUX is designedto have verystrict security. This is possible because the assistantuser-space
daemons is used to handle the complex exceptions.
TUX only serves a file if
1. The URL does not contain ?.
2. The URL does not start with /.
3. The URL points to a file that exists.
4. The file is world-readable.
1
5. The file is not a directory.
1
6. The file is not executable.
1
7. The file does not have the sticky-bit set.
1
8. The URL does not contain any forbidden substrings such as ..
1
1. Configurable through the sysctl parameters in /proc/sys/net/tux
1. Configurable through the sysctl parameters in /proc/sys/net/tux
1. Configurable through the sysctl parameters in /proc/sys/net/tux
1. Configurable through the sysctl parameters in /proc/sys/net/tux
1. Configurable through the sysctl parameters in /proc/sys/net/tux
23