Patrick,

Thanks for pointing me to the specific module responsible for the security, Patrick, and for the reality check.

I am continuing to investigate alternate webserver hosts. canadianwebhosting.com looks promising. They use an suPHP <http://helpdesk.canadianwebhosting.com/support-center/index.php?x=&mod_id=2&root=19&id=210> scheme which looks tight but workable, with "Your scripts and directories can have a maximum of 755 permissions" (all files have the same owner with rwx). I presume that would be workable? Would I have to reconfigure the umask(002); statement in pmwiki.php for this?

Hope you're well. I just (finally) upgraded one of my sites (www.dufferinpark.c) to 2.2, soon will do the others (the rest are all part of one farm). Then I'm *really* looking forward to playing with all the cool new features!

Best,

- Henrik

Patrick R. Michaud wrote:
On Sun, Mar 23, 2008 at 10:11:49AM -0400, Henrik wrote:
This security change by my webhost is confirmed. In response to my query they sent me the following response.

=============================

The web server security is setup such that it will automatically block system 
related words while posting data from php based applications, as this may lead 
to web server exploit. We request you to stop using system related words in 
your applications.

=============================

So suddenly none of my websites can post external links (with the string "http://"; anywhere in the page), and hundreds if not thousands of pages that have this protocol embedded are suddenly uneditable.

Truly horrible. A complete nightmare!

But nothing to do with PmWiki.


Just to follow up on this -- this particular issue is described
at http://www.pmwiki.org/wiki/PmWiki/Troubleshooting#mod_security .
There is no PmWiki-based workaround to it, as the problem is well
outside of PmWiki (as you've recognized).

I've never heard of someone using mod_security to block "http://"; before, though, so that's new (and an additional reason to doubt
the sanity of the webhosting provider).  Note that this security
measure affects not only PmWiki, but also any application that
tries to use an input form where someone might want to provide
an http:// link (e.g., comments to blog postings, shopping carts,
etc.).

Pm


--

Henrik Bechmann
www.bechmann.ca
Webmaster, www.dufferinpark.ca

_______________________________________________
pmwiki-users mailing list
[email protected]
http://www.pmichaud.com/mailman/listinfo/pmwiki-users

Reply via email to