Thanks,
In an other post, Hugo said :
wigwam -d root my-password-here
is for digest as using (-d flag)
and
wigwam -b root my-password-here
is for basic as using (-b flag)
but I tried any combinations, but can still not get it to work, I have the login popup form, but it's always back again after submitting login credential.
Here my config
# Hiawatha main configuration file
#
# VARIABLES
# With 'set', you can declare a variable. Make sure the name of the
# variable doesn't conflict with any of the configuration options.
# The variables are case-sensitive and cannot be redeclared.
#
set LOCALHOST = 127.0.0.0/8
# GENERAL SETTINGS
#
ServerId = www-data
ConnectionsTotal = 1000
ConnectionsPerIP = 65
SystemLogfile = /var/log/hiawatha/system.log
GarbageLogfile = /var/log/hiawatha/garbage.log
# BINDING SETTINGS
# A binding is where a client can connect to.
#
Binding {
Port = 80
}
#Binding {
# Port = 443
# TLScertFile = ssl/hiawatha.pem
# Interface = 127.0.0.1
# MaxRequestSize = 2048
# TimeForRequest = 30
#}
# BANNING SETTINGS
# Deny service to clients who misbehave.
#
#BanOnGarbage = 300
#BanOnMaxPerIP = 60
#BanOnMaxReqSize = 300
#KickOnBan = yes
#RebanDuringBan = yes
# COMMON GATEWAY INTERFACE (CGI) SETTINGS
# These settings can be used to run CGI applications.
#
#CGIhandler = /usr/bin/perl:pl
#CGIhandler = /usr/bin/php-cgi:php
#CGIhandler = /usr/bin/python:py
#CGIhandler = /usr/bin/ruby:rb
#CGIhandler = /usr/bin/ssi-cgi:shtml
#CGIextension = cgi
#
FastCGIserver {
FastCGIid = PHP5
ConnectTo = /var/run/php5-fpm.sock
Extension = php
}
# URL TOOLKIT
# This URL toolkit rule was made for the Banshee PHP framework,
# which can be downloaded from http://www.banshee-php.org/
#
UrlToolkit {
ToolkitID = wordpress
Match \.(php|phtml|xml|pdt|htaccess|hiawatha) DenyAccess ## very important to prevent direct wget / download access to files
RequestURI exists Return
Match .*\?(.*) Rewrite /index.php?$1
Match .* Rewrite /index.php
}
# DIRECTORY SETTINGS
# You can specify some settings per directory.
#
# DEFAULT WEBSITE
# It is wise to use your IP address as the hostname of the default website
# and give it a blank webpage. By doing so, automated webscanners won't find
# your possible vulnerable website.
#
Hostname = 127.0.0.1
WebsiteRoot = /var/www/hiawatha
StartFile = index.html
AccessLogfile = /var/log/hiawatha/default/access.log
ErrorLogfile = /var/log/hiawatha/default/error.log
# VIRTUAL HOSTS
# Use a VirtualHost section for each website you want to host.
#
VirtualHost {
Hostname = my-website.com, www.my-website.com
WebsiteRoot = /home/my-website/public_html
AccessLogfile = /var/log/hiawatha/my-website.com/access.log
ErrorLogfile = /var/log/hiawatha/my-website.com/error.log
StartFile = index.php
UseLocalConfig = yes
TimeForCGI = 60
UseFastCGI = PHP5
CustomHeader = X-Frame-Options: sameorigin
CustomHeader = Vary: Accept-Encoding
RandomHeader = 64
UseToolkit = wordpress
EnforceFirstHostname = yes
PreventXSS = yes
PreventCSRF = yes
PreventSQLi = yes
}
and in .hiawatha file located at folder : /home/my-website/public_html/ :
PasswordFile = basic:/home/dev-blesta/root.pswd