On Tue, 3 Aug 1999, Lamar Owen wrote:

LO> 3.) You may or may not want the HTTPD_RUN_USER to actually own the
LO> tables in question -- however, you will have to GRANT the perms desired.

AS I mentioned previously, there's currently no way to prevent user httpd
(or whoever under which httpd is running) to create tables. This is not a
serious security risc, AFAIC, but a risc of running over file quotas.


LO> In the case of AOLserver, the connections from the aolserver process
LO> (nsd) are pooled and are made with the userid of 'aolserver'.  For
LO> AOLserver, all files the nsd process (singular, since AOLserver is
LO> multithreaded) accesses are owned by 'aolserver' and chmod'd 600. 
LO> AOLserver uses a tcl API -- those files (*.tcl and *.adp) are also
LO> chmod'd 600, as AOLserver does its own interpreting -- php may need
LO> execute permission; I don't know.

Well, I suppose web site files should NOT be owned by httpd user, but only
readable (and, if needed, executable bu it) via group -- so permissions
should be 640 or 750, respectievly. This prevents possibility to change
web-content from erroneous cgi script, for example.

[All of above is just my $.02 :)]

Sincerely,
D.Marck                                   [DM5020, DM268-RIPE, DM3-RIPN]
------------------------------------------------------------------------
*** Dmitry Morozovsky --- D.Marck --- Wild Woozle --- [EMAIL PROTECTED] ***
------------------------------------------------------------------------

Reply via email to