Re: apache security

2007-01-26 Thread Toni Mueller
Hi, On Tue, 23.01.2007 at 21:45:14 +0100, Joachim Schipper [EMAIL PROTECTED] wrote: On Tue, Jan 23, 2007 at 05:44:38PM +0100, Almir Karic wrote: what i would like to achieve is that on a shared host if bad guys (tm) break into one site they can't get to other sites. is this possible?

Re: apache security

2007-01-26 Thread Lars Hansson
Toni Mueller wrote: To me, this currently comes down to using unique user and group ids for individual web site instances, and then chroot each server into their respective tree where the requirement for reading other people's data is to break out of the chroot first. This can be done with the

Re: apache security

2007-01-26 Thread RedShift
Lars Hansson wrote: Toni Mueller wrote: To me, this currently comes down to using unique user and group ids for individual web site instances, and then chroot each server into their respective tree where the requirement for reading other people's data is to break out of the chroot first. This

Re: apache security

2007-01-26 Thread Toni Mueller
Hi, On Fri, 26.01.2007 at 19:17:41 +0800, Lars Hansson [EMAIL PROTECTED] wrote: Toni Mueller wrote: To me, this currently comes down to using unique user and group ids for individual web site instances, and then chroot each server into their respective tree where the requirement for reading

Re: apache security

2007-01-24 Thread Alexander Farber
Joachim, could you share your config files for that? On 1/23/07, Joachim Schipper [EMAIL PROTECTED] wrote: The simple solution is to not allow the web server to write anywhere but /tmp. Regards Alex -- http://preferans.de

apache security

2007-01-23 Thread Almir Karic
what i would like to achieve is that on a shared host if bad guys (tm) break into one site they can't get to other sites. is this possible? i've been looking at su-exec but it is for cgi scripts only :/, what other options there are? AFAIK chroot is not the correct answer to my question as it

Re: apache security

2007-01-23 Thread Darren Spruell
On 1/23/07, Almir Karic [EMAIL PROTECTED] wrote: what i would like to achieve is that on a shared host if bad guys (tm) break into one site they can't get to other sites. break in has more than one meaning, and you might have different answers for different scenarios. is this possible? i've

Re: apache security

2007-01-23 Thread Lawrence Horvath
I had an idea but not sure if its possible, section off and chroot each site into a folder of its own, not sure if thats possible to chroot each site to a diff dir or not, i think apache only allows you to chroot the process Maybe use permissions, diff user on each site, chmod to disallow

Re: apache security

2007-01-23 Thread Almir Karic
Maybe use permissions, diff user on each site, chmod to disallow writing from other users? that would solve the problem, but i have no idea how to achive it, and google doesn't seem to like me :/. any hints? -- almir

Re: apache security

2007-01-23 Thread Jacob Yocom-Piatt
Almir Karic wrote: what i would like to achieve is that on a shared host if bad guys (tm) break into one site they can't get to other sites. is this possible? i've been looking at su-exec but it is for cgi scripts only :/, what other options there are? AFAIK chroot is not the correct answer to

Re: apache security

2007-01-23 Thread Joachim Schipper
On Tue, Jan 23, 2007 at 05:44:38PM +0100, Almir Karic wrote: what i would like to achieve is that on a shared host if bad guys (tm) break into one site they can't get to other sites. is this possible? i've been looking at su-exec but it is for cgi scripts only :/, what other options there

Re: apache security

2007-01-23 Thread Nick Holland
Almir Karic wrote: what i would like to achieve is that on a shared host if bad guys (tm) break into one site they can't get to other sites. if get to=look at, this is probably pointless. Unless it is a authentication-protected site, the information is usually spread around by various browser

Re: apache security

2007-01-23 Thread Mark Bucciarelli
On Tue, Jan 23, 2007 at 05:44:38PM +0100, Almir Karic wrote: is this possible? i've been looking at su-exec but it is for cgi scripts only :/, what other options there are? If you can run the app(s) with FastCGI (most PHP stuff I have tried does), another option is to use suexec wrapper for