Hi

Fairly new to this so please bear with me.

I have made a few patches so it will be possible to circumvent some 
restrictions on suEXEC.
1. The file must not have g+w on it.
2. The directory must not have g+w on it.

As a web-hotel systemsadministrator I have found this not be a very 
practical solution.

So I made a patch in /src/support/suexec.c that avoided the check for g+w 
on dir and file.
I created a SUEXEC_GROUPWRITE define for this purpose.

Also hacked the /configure � script and /Makefile.tmpl to make it 
possible to configure this by those means.

./configure -�suexec-groupwrite # With other commands too naturally

Diffs are generated on 1.3.20.

Is this of any interest to the development of the server?

diff src/support/suexec.c.old src/support/suexec.c
528a529,531
> #ifdef SUEXEC_GROUPWRITE
>     if ((dir_info.st_mode & S_IWOTH)) {
> #else
529a533
> #endif
544a549,551
> #ifdef SUEXEC_GROUPWRITE
>     if ((prg_info.st_mode & S_IWOTH)) {
> #else
545a553
> #endif

diff configure.old configure
72c72
< ##
---
> #
250a251
> suexec_groupwrite=0
466a468
>           echo " --suexec-groupwrite    allow suEXEC with group-writable 
access"
999a1002,1005
>       --suexec-groupwrite)
>           suexec_groupwrite=1
>           suexec_ok=1
>           ;;
1318a1325
> -e "s%@suexec_groupwrite@%$suexec_groupwrite%g" \

diff Makefile.tmpl.old Makefile.tmpl
140a141
> suexec_groupwrite = @suexec_groupwrite@
207a209
>                       -DSUEXEC_GROUPWRITE=\"$(suexec_groupwrite)\" \


Might have missed some security-considerations here.
As I see it. You often upload scripts with 775-mode on them. Also a good 
sysadmin will see to it that the web-tree has the group of the web-site. 
So that not the group "user" will be used or the like.

Please send me any comments. And if it will be possible to implement into 
a new server?

Best regards
Per-Olof Pettersson

Reply via email to