Re: security with mod_perl

2003-06-11 Thread Stas Bekman
Aaron Trevena wrote: [...] http://www.bytemark-hosting.co.uk do some good deals and discounts for free software author and seem nice people. Please submit ISPs that support mod_perl and/or virtual servers. so we can add them to: http://perl.apache.org/help/isps.html I've added the one mentioned

Re: security with mod_perl

2003-06-11 Thread Stas Bekman
Perrin Harkins wrote: On Wed, 2003-06-11 at 12:58, Mike Zelina wrote: I couldn't find any documentation on how a host *could* provide mod_perl and do it in a way that would be safe for his server and usable for a client. I was just talking about this with my co-workers. Here's one way: Set up

Re: security with mod_perl

2003-06-11 Thread Perrin Harkins
On Wed, 2003-06-11 at 12:58, Mike Zelina wrote: > I couldn't find any documentation on how a host *could* provide mod_perl > and do it in a way that would be safe for his server and usable for a > client. I was just talking about this with my co-workers. Here's one way: Set up a front-end apache

RE: security with mod_perl

2003-06-11 Thread Aaron Trevena
On Wed, 2003-06-11 at 18:09, Sidharth Malhotra wrote: > Not quite a manual, but read some of these discussions on PerlMonks: > > http://www.perlmonks.org/index.pl?node=mod+perl+isp+host&go_button=Search > "mod_perl shared hosting" > "ISPs supporting mod_perl" > "mod_perl: the bane of share webhost

RE: security with mod_perl

2003-06-11 Thread Sidharth Malhotra
Not quite a manual, but read some of these discussions on PerlMonks: http://www.perlmonks.org/index.pl?node=mod+perl+isp+host&go_button=Search "mod_perl shared hosting" "ISPs supporting mod_perl" "mod_perl: the bane of share webhosting" Hope this gives you some answers (not a lot of hope, though)

Re: security with mod_perl

2003-06-11 Thread siberian
We use BSD::Resource for our mod_perl clients. Keeps them from eating the machine alive. On another shared machine each client gets their own interpreter with some pretty tight limits on child spawning, open children etc. on top of the Resource limits Shared hosting mod_perl is a real drag to

Re: Security of a modperl enabled site

2002-03-19 Thread Perrin Harkins
> I am in front of a security issue. We are running several site using > modperl. Last days, a hacker used a script to call some script of our sites > for bad purpose. He needed to be authenticated, but we are only using > session cookies. Then, once he was loged in, he could retrieve this id and

Re: Security of a modperl enabled site

2002-03-19 Thread victor
Try this. http://www.snert.com/Software/mod_throttle/ Tor. fred wrote: > Hi, > > I am in front of a security issue. We are running several site using > modperl. Last days, a hacker used a script to call some script of our sites > for bad purpose. He needed to be authenticated, but we are only

Re: Security of a modperl enabled site

2002-03-19 Thread gidon
I've had people run password guessing scripts and stuff. I've handled it on a case by case basis, ie, limit the number of wrong guesses. There are a bunch of modules that can set limits as well which can come in handy against very brutish sorts of misuses of your site,. I used mod_throttle.c, t

[OT] Re: security!

2001-03-02 Thread darren chamberlain
Matt Sergeant ([EMAIL PROTECTED]) said something to this effect on 03/02/2001: > ...now that I've developed applications that make rather extensive > use of the Apache API, I would actually love to have an environment > similar to CGI but providing the full Apache API, including logging, > notes/p

RE: security!

2001-03-02 Thread Matt Sergeant
On Thu, 1 Mar 2001, [EMAIL PROTECTED] wrote: > > I used to believe that too, but now that I've developed > > applications that make rather extensive use of the Apache API, I would > > actually love to have an environment similar to CGI but > > providing the full > > Apache API, including logging

RE: security!

2001-03-01 Thread mgraham
> > And forking a new process under mod_perl > > really defeats the purpose. > > Does it? Well I confess I just assumed. > I used to believe that too, but now that I've developed > applications that make rather extensive use of the Apache API, I would > actually love to have an environment s

(changing userids/2.0/suexec) was: RE: security!

2001-03-01 Thread Tom Brown
> > > > > This is a general Unix webserver issue and not specific to > > > mod_perl, so I've marked your message [OT] for off-topic. > > > > Well, workarounds are available for specific webserver environments, so I > > don't believe it's an inappropriate question. > > > > With CGI, you use the

RE: security!

2001-03-01 Thread Matt Sergeant
On Thu, 1 Mar 2001, [EMAIL PROTECTED] wrote: > > > This is a general Unix webserver issue and not specific to > > mod_perl, so I've marked your message [OT] for off-topic. > > Well, workarounds are available for specific webserver environments, so I > don't believe it's an inappropriate questi

RE: security!

2001-03-01 Thread mgraham
> This is a general Unix webserver issue and not specific to > mod_perl, so I've marked your message [OT] for off-topic. Well, workarounds are available for specific webserver environments, so I don't believe it's an inappropriate question. With CGI, you use the suexec mechanism to start execu

Re: security

2001-03-01 Thread Todd Finney
Stas Bekman wrote: > On Wed, 28 Feb 2001, Gustavo Vieira Goncalves Coelho Rios wrote: > > the key user\password are kept inside this file, so anyone can uses an > > editor to retrieve the user mysql account. I resolve this problem > > running php on secure mode and chgrping the php file th

Re: security!

2001-03-01 Thread clayton cottingham
Vladimir Ivaschenko wrote: > > Take a look at http://www.freevsd.org. I haven't used it personally, but > it looks like something that you need.. > This system is a based on making a chroot environment for each user with > his own apache and everything. > i can vouch for this approach to develo

Re: security!

2001-03-01 Thread Vladimir Ivaschenko
Take a look at http://www.freevsd.org. I haven't used it personally, but it looks like something that you need.. This system is a based on making a chroot environment for each user with his own apache and everything. Gustavo Vieira Goncalves Coelho Rios wrote about "security!": > After some tim

Re: security

2001-03-01 Thread Jimi Thompson
Probably a stupid question, but wouldn't named virtuals solve this problem? I'm not all that familiar with MySQL, but we have a similar set up here with slightly different technology - Solaris, Netscape Enterprise Server, and Oracle. I should think that you could replicate this using BSD, Apache,

Re: security

2001-03-01 Thread Stas Bekman
On Thu, 1 Mar 2001, Gunther Birznieks wrote: > mod_perl 2.0 > > At 10:33 PM 2/28/2001 -1000, Kee Hinckley wrote: > >-BEGIN PGP SIGNED MESSAGE- > >Hash: SHA1 > > > >At 9:44 AM +0800 3/1/01, Stas Bekman wrote: > > >At this moment anybody who has an access to mod_perl server can read any > >

Re: security

2001-03-01 Thread Gunther Birznieks
mod_perl 2.0 At 10:33 PM 2/28/2001 -1000, Kee Hinckley wrote: >-BEGIN PGP SIGNED MESSAGE- >Hash: SHA1 > >At 9:44 AM +0800 3/1/01, Stas Bekman wrote: > >At this moment anybody who has an access to mod_perl server can read any > >data which is accessible by the same server. suexec is not an

Re: security

2001-03-01 Thread Kee Hinckley
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 At 9:44 AM +0800 3/1/01, Stas Bekman wrote: >At this moment anybody who has an access to mod_perl server can read any >data which is accessible by the same server. suexec is not an option >because of process persistance. I suspect this is why it is v

Re: security

2001-02-28 Thread Stas Bekman
On Wed, 28 Feb 2001, Gustavo Vieira Goncalves Coelho Rios wrote: > Hi folks! > > I have a FreeBSD server configured as a http server, running apache. > This installation includes mod_perl+EmbPerl, mod_php4 mod_cgi and > mod_fastcgi. Some of my users will be using mysql for database. The > problem

RE: security suggestion

2001-01-11 Thread Doug MacEachern
On Fri, 17 Nov 2000, mgraham wrote: > Maybe another approach would be to explicitly list the handlers that > are allowed to be used in any given context. Kind of > like 'Options', but for perl handlers. Something like 'PerlOptions', > perhaps? > > > PerlOptions "My::AuthHandler My::C

Re: security suggestion

2000-11-20 Thread Dave Kaufman
"Gunther Birznieks" <[EMAIL PROTECTED]> wrote: > In the context of what you are talking about, I think giving ExecCGI > permissions should not allow them to change mod_perl handlers or do > anything to adjust mod_perl either. ExecCGI is a lot less problematic than > exposing access to mod_perl

Re: security suggestion

2000-11-20 Thread Dave Kaufman
"Richard L. Goerwitz" <[EMAIL PROTECTED]> wrote: > Gunther Birznieks wrote: > > > ...I would advocate an ExecModPerl option or something like that so that > > user's could not arbitrarily install their own Perl Handlers. > > If a user has ExecCGI privileges he or she can commandeer the most imp

Re: security suggestion

2000-11-20 Thread Gunther Birznieks
At 08:42 AM 11/20/00 -0500, Richard L. Goerwitz wrote: >Gunther Birznieks wrote: > > > >At the risk of repeating myself, I'm looking for a way of setting up mod_ > > >perl so that, if I turn off ExecCGI for a given directory (and maybe spe- > > >cify a list of Perl modules or paths), it will mean

Re: security suggestion

2000-11-20 Thread Richard L. Goerwitz
Gunther Birznieks wrote: > >At the risk of repeating myself, I'm looking for a way of setting up mod_ > >perl so that, if I turn off ExecCGI for a given directory (and maybe spe- > >cify a list of Perl modules or paths), it will mean that, as far as mod_perl > >is concerned, > > > > 1) users ca

Re: security suggestion

2000-11-20 Thread Gunther Birznieks
In the context of what you are talking about, I think giving ExecCGI permissions should not allow them to change mod_perl handlers or do anything to adjust mod_perl either. ExecCGI is a lot less problematic than exposing access to mod_perl from a shared web server security standpoint especiall

Re: security suggestion

2000-11-19 Thread Richard Goerwitz
Gunther Birznieks wrote: > The CGI scripts on your site would not be passed through Apache::Registry > or Apache::PerlRun, they would run as normal CGIs. No? So that makes sense > as a motivation to allow mod_perl on a server for content handlers that are > tightly defined. But don't allow the us

Re: security suggestion

2000-11-18 Thread Gunther Birznieks
I think Randal was making a similar point I was making last night (SG time). That as long as you execute Perl code, you can manipualte the memory space of Perl (and hance change the behavior of Apache::Registry). But you explained it in your reply to me. Basically you want explicit handlers th

Re: security suggestion

2000-11-17 Thread Richard L. Goerwitz
"Randal L. Schwartz" wrote: > I think y'all are missing it. As soon as I have any Perl code access > via Apache::Registry or anything like that, I can do this: > > *Apache::Registry::handler = \&my_trojan_horse; Can you explain in what server-configuration context the above directive w

Re: security suggestion

2000-11-17 Thread Randal L. Schwartz
> "Richard" == Richard L Goerwitz <[EMAIL PROTECTED]> writes: Richard> That's a neat idea. Richard> The only quibble I can think of is that this doesn't go far enough. Richard> This lower level of privilege we're talking about is one in which - Richard> 1) Only specific Perl modules are a

Re: security suggestion

2000-11-17 Thread Richard L. Goerwitz
mgraham wrote: > Maybe another approach would be to explicitly list the handlers that > are allowed to be used in any given context. Kind of > like 'Options', but for perl handlers. Something like 'PerlOptions', > perhaps? > > > PerlOptions "My::AuthHandler My::ContentHandler My::Tran

RE: security suggestion

2000-11-17 Thread mgraham
> I'd have no problem if mod_perl was set up to turn off > PerlSetEnv, lit- > eral 'sub { ... }' handlers, Perl sections, and the use of > Perl modules > in non-system paths (except where ExecCGI is turned on). Maybe another approach would be to explicitly list the handlers that are allowed to

Re: security suggestion

2000-11-17 Thread Richard L. Goerwitz
"Randal L. Schwartz" wrote: > Use Template Toolkit, and disable the "EVAL_PERL" option for their space. > Set up Plugins and Filters that call your Cool Perl Code. > Then they write arbitary text files to be delivered... Suppose it were possible to set Perl-based modules to work the same way C m

Re: security suggestion

2000-11-17 Thread Randal L. Schwartz
> "Richard" == Richard L Goerwitz <[EMAIL PROTECTED]> writes: Richard> I simply want to be able to do the same thing in Perl with mod_perl. I Richard> want to be able to give developers ("users" - whatever you want to call Richard> them) added functionality, without giving them the ability t

Re: security suggestion

2000-11-17 Thread Richard L. Goerwitz
Gunther Birznieks wrote: > It seems to me that mod_perl wasn't really designed for safety against your > own developers I accept this point. But it's really beside _my_ point, which was that mod_perl modules can offer critical added functionality to run-of-the-mill web publishers (whether i

Re: security suggestion

2000-11-17 Thread Gunther Birznieks
I think these are good points. However, to some degree, if this is an attempt to allow an ISP protection, it's not because most ISPs offer CGI access to their customers. In addition, the moment you give mod_perl access to a developer they have the rights to do a LOT of stuff that goes beyond p

Re: security suggestion

2000-11-16 Thread Dave Kaufman
"Adam Prime" <[EMAIL PROTECTED]> wrote: > Maybe it's just me, but it seems that the responses richard has gotten > haven't really touched on the core of the problem. That mod_perl isn't > exactly friendly to sysadmin's who want to run apache on a (i'm guessing), > student accessed server, with u

Re: security suggestion

2000-11-16 Thread Dave Kaufman
"Adam Prime" <[EMAIL PROTECTED]> wrote: > Maybe it's just me, but it seems that the responses richard has gotten > haven't really touched on the core of the problem. That mod_perl isn't > exactly friendly to sysadmin's who want to run apache on a (i'm guessing), > student accessed server, with u

Re: security suggestion

2000-11-16 Thread James G Smith
Adam Prime <[EMAIL PROTECTED]> wrote: >The servers that had apache on them for users when i was at school didn't >even allow normal cgi, so i have no idea how one would approach doing >something like this with mod_perl. Even more convoluted is when a user can ExecCGI, but only via suexec. mod_p

RE: security suggestion

2000-11-16 Thread Geoffrey Young
> -Original Message- > From: Adam Prime [mailto:[EMAIL PROTECTED]] > Sent: Thursday, November 16, 2000 11:46 AM > To: '[EMAIL PROTECTED]'; [EMAIL PROTECTED] > Cc: Geoffrey Young > Subject: RE: security suggestion > > > The servers that had a

RE: security suggestion

2000-11-16 Thread Christian Gilmore
> The thing is, though, that as a web administrator I don't want those > same developers (or at least all of them) to be able to create and in- > stall _arbitrary_ handlers or arbitrary perl code. Sometimes the de- > velopers just don't know enough. And sometimes I just don't trust > them enough

RE: security suggestion

2000-11-16 Thread Adam Prime
Maybe it's just me, but it seems that the responses richard has gotten haven't really touched on the core of the problem. That mod_perl isn't exactly friendly to sysadmin's who want to run apache on a (i'm guessing), student accessed server, with user dir's and all that other stuff. I'm pretty s

Re: security suggestion

2000-11-16 Thread Richard L. Goerwitz
Geoffrey Young wrote: > maybe it would be possible to limit > > PerlAuthenHandler 'sub {do something desctructive};' > > via a directive, but this is mod_perl - I can't see how you would be able to > allow good activity without there being some way around it for destructive > types... That's w

RE: security suggestion

2000-11-16 Thread Jerrad Pierce
Perhaps you ought to gfind a way to use Safe; then? >-Original Message- >From: Richard L. Goerwitz [mailto:[EMAIL PROTECTED]] >Sent: Thursday, November 16, 2000 9:09 AM >To: mod_perl list >Subject: security suggestion > > >At Doug's suggestion I'm moving a brief conversation we've had >i

RE: security suggestion

2000-11-16 Thread Geoffrey Young
> -Original Message- > From: Richard L. Goerwitz [mailto:[EMAIL PROTECTED]] > Sent: Thursday, November 16, 2000 10:11 AM > To: [EMAIL PROTECTED] > Cc: Geoffrey Young > Subject: Re: security suggestion > > > Following up on the security suggestion (I'm

Re: security suggestion

2000-11-16 Thread Richard L. Goerwitz
Following up on the security suggestion (I'm actually responding to private mail, so I'll just quote the person who wrote to me without giving a name) - > Of course you can do this in an .htaccess file, too: > > > arbitrary perl code... > I'd argue that people shouldn't be able to do that -

Re: security suggestion

2000-10-18 Thread Richard L. Goerwitz
Would it make sense to allow anonymous subroutines as handlers only if ExecCGI is turned on for a given directory? (Likewise, allow handlers only in modules residing in system directories unless ExecCGI is turned on?) -- Richard Goerwitz[EMAIL PROTECTED]

Re: Security of PerlHandler directives

2000-09-19 Thread Matt Sergeant
On Tue, 19 Sep 2000, Richard Goerwitz wrote: > I can certainly understand why someone would want to keep Registry > or Embperl-enabled scripts in directories reserved for trusted sys- > tems people. > > But it shouldn't be a tremendously big deal to allow people to use > pre-written modules usin

Re: Security in displaying arbitrary HTML

2000-04-28 Thread Gunther Birznieks
At 10:25 AM 4/28/00 +0100, Matt Sergeant wrote: >On Fri, 28 Apr 2000, Marc Slemko wrote: > > > On Thu, 27 Apr 2000, Matt Sergeant wrote: > > > > > Unfortunately there's also a browser bug to contend with. They treat \x8b > > > (I think that's the right code) as < and there's a similar code for > >

Re: Security in displaying arbitrary HTML

2000-04-28 Thread Matt Sergeant
On Fri, 28 Apr 2000, Marc Slemko wrote: > On Thu, 27 Apr 2000, Matt Sergeant wrote: > > > Unfortunately there's also a browser bug to contend with. They treat \x8b > > (I think that's the right code) as < and there's a similar code for > > >. Since most web developers are just doing s/ > attacks

Re: Security in displaying arbitrary HTML

2000-04-28 Thread Marc Slemko
On Thu, 27 Apr 2000, Matt Sergeant wrote: > Unfortunately there's also a browser bug to contend with. They treat \x8b > (I think that's the right code) as < and there's a similar code for > >. Since most web developers are just doing s/ attacks based on character sets like this. Sad, but true. Ev

RE: Security in displaying arbitrary HTML

2000-04-28 Thread Matt Sergeant
On Fri, 28 Apr 2000, Gerald Richter wrote: > > > > Gerald, what about Embperl, does it escape \x8b? > > > > No, there is no html escape for \x8b (and I guess the other one Matt > mentioned is \0x8d for >) I know, so Embperl will not escape it, but this > could be simply change by an entry in epc

RE: Security in displaying arbitrary HTML

2000-04-28 Thread Gerald Richter
> > Gerald, what about Embperl, does it escape \x8b? > No, there is no html escape for \x8b (and I guess the other one Matt mentioned is \0x8d for >) I know, so Embperl will not escape it, but this could be simply change by an entry in epchar.c. Any suggestion to what this should be escaped? Then

Re: Security in displaying arbitrary HTML

2000-04-28 Thread Dirk Lutzebaeck
Matt Sergeant writes: > Unfortunately there's also a browser bug to contend with. They treat \x8b > (I think that's the right code) as < and there's a similar code for > >. Since most web developers are just doing s/ attacks based on character sets like this. Sad, but true. Even our loved > C

RE: Security in displaying arbitrary HTML

2000-04-28 Thread Leon Brocard
Jeremy Howard wrote: > I'm interested in providing 'HTML email' support for my users > (like HotMail, Outlook Express, Eudora 4.0, etc provide), but > I'm very nervous about security. Essentially, providing HTML > email involves letting any arbitrary HTML get displayed by Apache... I've been

Re: Security in displaying arbitrary HTML

2000-04-28 Thread Dirk Lutzebaeck
Matt Sergeant writes: > Unfortunately there's also a browser bug to contend with. They treat \x8b > (I think that's the right code) as < and there's a similar code for > >. Since most web developers are just doing s/ attacks based on character sets like this. Sad, but true. Even our loved > C

Re: Security in displaying arbitrary HTML

2000-04-27 Thread Jeffrey W. Baker
On Thu, 27 Apr 2000, John M Vinopal wrote: > I am a bad hacker and watching your line. I see cookies A and B go to you. > I set cookies A and B in my web browser. I am now you. You can try to > permute the cookies with IP# (breaks on proxies) or Browser type, but all > cookie based approaches

Re: Security in displaying arbitrary HTML

2000-04-27 Thread John M Vinopal
I am a bad hacker and watching your line. I see cookies A and B go to you. I set cookies A and B in my web browser. I am now you. You can try to permute the cookies with IP# (breaks on proxies) or Browser type, but all cookie based approaches believe in the value of something sent cleartext. O

Re: Security in displaying arbitrary HTML

2000-04-27 Thread Matt Sergeant
On Thu, 27 Apr 2000, Vivek Khera wrote: > > "SC" == Steven Champeon <[EMAIL PROTECTED]> writes: > > SC> developers and designers) for Webmonkey: > > SC> http://hotwired.lycos.com/webmonkey/00/18/index3a.html > > SC> If you want to see what sort of stuff the XSS problem opens you up for, >

Re: Security in displaying arbitrary HTML

2000-04-27 Thread Marc Slemko
On Thu, 27 Apr 2000, Vivek Khera wrote: > > "SC" == Steven Champeon <[EMAIL PROTECTED]> writes: > > SC> developers and designers) for Webmonkey: > > SC> http://hotwired.lycos.com/webmonkey/00/18/index3a.html > > SC> If you want to see what sort of stuff the XSS problem opens you up for, >

Re: Security in displaying arbitrary HTML

2000-04-27 Thread Steven Champeon
On Thu, 27 Apr 2000, Vivek Khera wrote: > Why on earth would you take user input and output it verbatim to your > pages? Rule number 1 of developing a web site is to never trust the > user's input values. *Always* validate it against what you're > expecting. I guess someone had better tell the

Re: Security in displaying arbitrary HTML

2000-04-27 Thread Vivek Khera
> "SC" == Steven Champeon <[EMAIL PROTECTED]> writes: SC> developers and designers) for Webmonkey: SC> http://hotwired.lycos.com/webmonkey/00/18/index3a.html SC> If you want to see what sort of stuff the XSS problem opens you up for, SC> just try appending ?tw=alert("aha!"); to the URL abo

Re: Security in displaying arbitrary HTML

2000-04-27 Thread Steven Champeon
On Thu, 27 Apr 2000, Marc Slemko wrote: > > Can you be more specific about why you say that? If I set an encrypted, > > short-lived cookie upon validated authentication, why is that any less > > secure than any of the other approaches you mentioned? > > It isn't necessarily any "less secure", but

Re: Security in displaying arbitrary HTML

2000-04-27 Thread Marc Slemko
On Thu, 27 Apr 2000, Nick Tonkin wrote: > On Thu, 27 Apr 2000, Marc Slemko wrote: > > > Cookies are not secure and will never be secure. They may be "good > > enough", and you may not have much choice, but they are still simply not > > secure when you put everything together. > > Can you be mo

Re: Security in displaying arbitrary HTML

2000-04-27 Thread Nick Tonkin
On Thu, 27 Apr 2000, Marc Slemko wrote: > Cookies are not secure and will never be secure. They may be "good > enough", and you may not have much choice, but they are still simply not > secure when you put everything together. Can you be more specific about why you say that? If I set an encrypt

Re: Security in displaying arbitrary HTML

2000-04-27 Thread Marc Slemko
On Thu, 27 Apr 2000, Jeremy Howard wrote: > I'm interested in providing 'HTML email' support for my users (like > HotMail, Outlook Express, Eudora 4.0, etc provide), but I'm very > nervous about security. Essentially, providing HTML email involves > letting any arbitrary HTML get displayed by Apa