Уеб сървърите поддържат ли само един уеб сайт?

Съдържание:

Уеб сървърите поддържат ли само един уеб сайт?
Уеб сървърите поддържат ли само един уеб сайт?

Видео: Уеб сървърите поддържат ли само един уеб сайт?

Видео: Уеб сървърите поддържат ли само един уеб сайт?
Видео: ЗАПРЕЩЁННЫЕ ТОВАРЫ с ALIEXPRESS 2023 ШТРАФ и ТЮРЬМА ЛЕГКО! - YouTube 2024, Може
Anonim
Когато за пръв път започнете да научите как имената на домейни, IP адресите, уеб сървърите и уеб сайтовете съвпадат и работят заедно, това може да е малко объркващо или поразително от време на време. Как всичко е настроено да работи толкова гладко? Днешната публикация "Суперуслуги Q &A" има отговорите на въпросите на любознателен читател.
Когато за пръв път започнете да научите как имената на домейни, IP адресите, уеб сървърите и уеб сайтовете съвпадат и работят заедно, това може да е малко объркващо или поразително от време на време. Как всичко е настроено да работи толкова гладко? Днешната публикация "Суперуслуги Q &A" има отговорите на въпросите на любознателен читател.

Днешната сесия за въпроси и отговори ни идва с любезното съдействие на SuperUser - подразделение на Stack Exchange - обединяване на уеб сайтове с въпроси и отговори.

Снимката е предоставена от Rosmarie Voegtli (Flickr).

Въпроса

Потребителят на четец на SuperUser3407319 иска да знае дали уеб сървърите съдържат само един уеб сайт:

Based on what I understand about DNS and linking a domain name with the IP address of the web server a website is stored on, does that mean each web server can only hold one website? If web servers do hold more than one website, then how does it all get resolved so that I can access the website I want without any problems or mix ups?

Уеб сървърите поддържат ли само един уеб сайт или държат ли повече?

Отговорът

Сътрудникът на SuperUser Bob има отговора за нас:

Basically, the browser includes the domain name in the HTTP request so the web server knows which domain was requested and can respond accordingly.

HTTP Requests

Here is how your typical HTTP request happens:

1. The user provides a URL, in the form https://host:port/path.

2. The browser extracts the host (domain) part of the URL and translates it into an IP address (if necessary) in a process known as name resolution. This translation can occur via DNS, but it does not have to (for example, the local hosts file on common operating systems bypasses DNS).

3. The browser opens a TCP connection to the specified port, or defaults to port 80 on that IP address.

4. The browser sends an HTTP request. For HTTP/1.1, it looks like this:

The host header is standard and required in HTTP/1.1. It was not specified in the HTTP/1.0 spec, but some servers support it anyway.
The host header is standard and required in HTTP/1.1. It was not specified in the HTTP/1.0 spec, but some servers support it anyway.

From here, the web server has several pieces of information that it can use to decide what the response should be. Note that it is possible for a single web server to be bound to multiple IP addresses.

  • The requested IP address, from the TCP socket (the IP address of the client is also available, but this is rarely used, and sometimes for blocking/filtering)
  • The requested port, from the TCP socket
  • The requested host name, as specified in the host header by the browser in the HTTP request
  • The requested path
  • Any other headers (cookies, etc.)

As you seem to have noticed, the most common shared hosting setup these days puts multiple websites on a single IP address:port combination, leaving just the host to differentiate between websites.

This is known as a Name-Based Virtual Host in Apache-land, while Nginx calls them Server Names in Server Blocks, and IIS prefers Virtual Server.

What About HTTPS?

HTTPS is a bit different. Everything is identical up to the establishment of the TCP connection, but after that an encrypted TLS tunnel must be established. The goal is to not leak any information about the request.

In order to verify that the web server actually owns this domain, the web server must send a certificate signed by a trusted third party. The browser will then compare this certificate with the domain it requested.

This presents a problem. How does the web server know which host/website’s certificate to send if it needs to do this before the HTTP request is received?

Traditionally, this was solved by having a dedicated IP address (or port) for every website requiring HTTPS. Obviously, this has become problematic as we are running out of IPv4 addresses.

Enter SNI (Server Name Indication). The browser now passes the host name during the TLS negotiations, so the web server has this information early enough to send the correct certificate. On the web server side, configuration is very similar to how HTTP virtual hosts are configured.

The downside is the host name is now passed as plain text before encryption, and is essentially leaked information. This is usually considered an acceptable trade-off though considering the host name is normally exposed in a DNS query anyway.

What If You Request a Website by IP Address Only?

What the web server does when it does not know which specific host you requested depends on the web server’s implementation and configuration. Typically, there is a “default”, “catch-all”, or “fall back” website specified that will provide responses to all requests that do not explicitly specify a host.

This default website can be its own independent website (often showing an error message), or it could be any of the other websites on the web server depending on the preferences of the web server admin.

Имате ли нещо, което да добавите към обяснението? Звучи в коментарите. Искате ли да прочетете повече отговори от други потребители на Stack Exchange? Вижте цялата тема на дискусията тук.

Препоръчано: