Re: security with mod_perl

2003-06-11 Thread Stas Bekman
Aaron Trevena wrote: [...] http://www.bytemark-hosting.co.uk do some good deals and discounts for free software author and seem nice people. Please submit ISPs that support mod_perl and/or virtual servers. so we can add them to: http://perl.apache.org/help/isps.html I've added the one mentioned

Re: security with mod_perl

2003-06-11 Thread Stas Bekman
Perrin Harkins wrote: On Wed, 2003-06-11 at 12:58, Mike Zelina wrote: I couldn't find any documentation on how a host *could* provide mod_perl and do it in a way that would be safe for his server and usable for a client. I was just talking about this with my co-workers. Here's one way: Set up

Re: security with mod_perl

2003-06-11 Thread Perrin Harkins
On Wed, 2003-06-11 at 12:58, Mike Zelina wrote: > I couldn't find any documentation on how a host *could* provide mod_perl > and do it in a way that would be safe for his server and usable for a > client. I was just talking about this with my co-workers. Here's one way: Set up a front-end apache

RE: security with mod_perl

2003-06-11 Thread Aaron Trevena
On Wed, 2003-06-11 at 18:09, Sidharth Malhotra wrote: > Not quite a manual, but read some of these discussions on PerlMonks: > > http://www.perlmonks.org/index.pl?node=mod+perl+isp+host&go_button=Search > "mod_perl shared hosting" > "ISPs supporting mod_perl" > "mod_perl: the bane of share webhost

RE: security with mod_perl

2003-06-11 Thread Sidharth Malhotra
answers (not a lot of hope, though) -Sidharth. -Original Message- From: Mike Zelina [mailto:[EMAIL PROTECTED] Sent: Wednesday, June 11, 2003 12:59 PM To: [EMAIL PROTECTED] Subject: security with mod_perl I have a local hosting provider who has mod_perl installed on the server, but will

Re: security with mod_perl

2003-06-11 Thread siberian
ve a local hosting provider who has mod_perl installed on the server, but will not enable it for security reasons. After doing some digging on the mod_perl site and thinking about how many ways a renegade mod_perl program could bring down a site (large modules using a lot of memory means larger

security with mod_perl

2003-06-11 Thread Mike Zelina
I have a local hosting provider who has mod_perl installed on the server, but will not enable it for security reasons. After doing some digging on the mod_perl site and thinking about how many ways a renegade mod_perl program could bring down a site (large modules using a lot of memory means

Security Concern, massive CGI or Headers problems?

2003-02-04 Thread Narins, Josh
I, rather blindly, put a reference to a hash of the HTTP headers and hash of the CGI params in pnotes for most requests. Technically, a poorly formed loop might DOS a child if the number of params or headers is evilly large. For instance, someone silly could write my $params = $r->pnotes('param

Re: AW: Apache::DBI and password security

2002-11-15 Thread James G Smith
=?iso-8859-1?Q?=22Fa=DFhauer=2C_Wolfgang=2C_FCI3=22?= <[EMAIL PROTECTED] ads.net> wrote: >>>Hi, >>> >>>I want to build a database application based on mod_perl and Apache::DBI. >>>The goal of Apache::DBI is to get persistent database connections using >only >>>one database user because of resource

Re: AW: Apache::DBI and password security

2002-11-15 Thread Matthew Byng-Maddick
Blowfish_PP would cut my danglies off > for that one. Which is why you copied him in the first place? :-) In general, though, there isn't a good way to get any security from any system that has to be able to access sensitive data in an automatic way. MBM -- Matthew Byng-Maddick

Re: AW: Apache::DBI and password security

2002-11-15 Thread Rafiq Ismail (ADMIN)
On Fri, 15 Nov 2002, [iso-8859-1] "Faßhauer, Wolfgang, FCI3" wrote: >>Hmm. I think that the guy who wrote Blowfish_PP would cut my > danglies off >>for that one. > >This is an interesting idea. Cutting my danglies off? hmm. Sounds painful. >Many thanks to you, Rafiq! s'ok, although I wouldn't

AW: Apache::DBI and password security

2002-11-15 Thread "Faßhauer, Wolfgang, FCI3"
>>Yes, that's our plan, too. But the risk still remains that someone will get a look to the script. I think, there is a golden rule: Never put clear text passwords in files. Those files are stored in archives by backup for example. There maybe a lot >>of people (sysadmin, developer, ...) c

Re: AW: Apache::DBI and password security

2002-11-15 Thread Rafiq Ismail (ADMIN)
On Fri, 15 Nov 2002, [iso-8859-1] "Faßhauer, Wolfgang, FCI3" wrote: > > Have you thought of running your webserver as some 'www' user? You can > > then make your scripts readonly by a 'dev' group which the www user and > > the developes are members of. > >CORRECT: > >'readonly' should be 'only rea

AW: Apache::DBI and password security

2002-11-15 Thread "Faßhauer, Wolfgang, FCI3"
>>Hi, >> >>I want to build a database application based on mod_perl and Apache::DBI. >>The goal of Apache::DBI is to get persistent database connections using only >>one database user because of resource limits. The problem I see is that the >>password for connecting to the database is clear readab

Re: Apache::DBI and password security

2002-11-15 Thread Rafiq Ismail (ADMIN)
On Fri, 15 Nov 2002, Rafiq Ismail (ADMIN) wrote: > On Fri, 15 Nov 2002, [iso-8859-1] "Faßhauer, Wolfgang, FCI3" wrote: > > one database user because of resource limits. The problem I see is that the > > password for connecting to the database is clear readable in the perl > > script. > > Does anyb

Re: Apache::DBI and password security

2002-11-15 Thread Rafiq Ismail (ADMIN)
On Fri, 15 Nov 2002, [iso-8859-1] "Faßhauer, Wolfgang, FCI3" wrote: > one database user because of resource limits. The problem I see is that the > password for connecting to the database is clear readable in the perl > script. > Does anybody know how to hide that password? Have you thought of run

Apache::DBI and password security

2002-11-15 Thread "Faßhauer, Wolfgang, FCI3"
Hi, I want to build a database application based on mod_perl and Apache::DBI. The goal of Apache::DBI is to get persistent database connections using only one database user because of resource limits. The problem I see is that the password for connecting to the database is clear readable in the pe

Re: Local file security (in 1.27)

2002-08-01 Thread Kari Nurmela
> > >So, question is: How do I protect my data files from being accessed by >anything else than my own perlhandler? Can I set another uid for all that >has to do with my specific perlhandler? Hints are most welcome. > > // Joel > > Maybe you are facing the same problem, that I asked earlier

Re: Local file security (in 1.27)

2002-08-01 Thread Stas Bekman
[...] > So, question is: How do I protect my data files from being accessed by > anything else than my own perlhandler? Can I set another uid for all that > has to do with my specific perlhandler? Hints are most welcome. You can't. The only solution is run a dedicated server for each user. Cur

Local file security (in 1.27)

2002-08-01 Thread Joel Palmius
I'm developing an online survey system under mod_perl (with a homemade perlhandler, not under Apache::Registry). Since I've had as a goal to avoid as many dependencies as possible, I store results in local plaintext files. By nature, these files has (?) to be writable by the uid apache runs as.

RE: Doing security for backend applications

2002-06-06 Thread Ken Miller
heers! -klm. -Original Message- From: Ask Bjoern Hansen [mailto:[EMAIL PROTECTED]] Sent: Wednesday, June 05, 2002 4:18 PM To: Ken Miller Cc: Modperl Subject: Re: Doing security for backend applications On Tue, 4 Jun 2002, Ken Miller wrote: [...] > So, php application reques

Re: Doing security for backend applications

2002-06-05 Thread Ask Bjoern Hansen
ing the php server forward authentication requests to the mod_perl server; but support the same cookie format would be relatively simple. > This is all related to a single sign-on environment - once the user has > signed on an encrypted cookie will contain the application security > informati

Re: Doing security for backend applications

2002-06-05 Thread Ken Miller
t;Ken Miller" <[EMAIL PROTECTED]> To: "Modperl" <[EMAIL PROTECTED]> Sent: Tuesday, June 04, 2002 3:56 PM Subject: Doing security for backend applications > Let's say I have the following configuration: > > 1. Front end proxy server (no mod_perl) > 2. Bac

Doing security for backend applications

2002-06-05 Thread Ken Miller
Let's say I have the following configuration: 1. Front end proxy server (no mod_perl) 2. Back end application server (mod_perl) 3. Back end application server (php) Now, *all* application requests are passed to the mod_perl server (yes, including the php requests). Performing security c

Re: Security of a modperl enabled site

2002-03-19 Thread Perrin Harkins
> I am in front of a security issue. We are running several site using > modperl. Last days, a hacker used a script to call some script of our sites > for bad purpose. He needed to be authenticated, but we are only using > session cookies. Then, once he was loged in, he could retrieve

Re: Security of a modperl enabled site

2002-03-19 Thread victor
Try this. http://www.snert.com/Software/mod_throttle/ Tor. fred wrote: > Hi, > > I am in front of a security issue. We are running several site using > modperl. Last days, a hacker used a script to call some script of our sites > for bad purpose. He needed to be authenticated,

Re: Security of a modperl enabled site

2002-03-19 Thread gidon
I've had people run password guessing scripts and stuff. I've handled it on a case by case basis, ie, limit the number of wrong guesses. There are a bunch of modules that can set limits as well which can come in handy against very brutish sorts of misuses of your site,. I used mod_throttle.c, t

Security of a modperl enabled site

2002-03-19 Thread fred
Hi, I am in front of a security issue. We are running several site using modperl. Last days, a hacker used a script to call some script of our sites for bad purpose. He needed to be authenticated, but we are only using session cookies. Then, once he was loged in, he could retrieve this id and

Re: RFC: Security/Performance Best Practices (long)

2001-11-11 Thread Stas Bekman
Philip Mak wrote: > Recently, I've been using Apache::ASP to program a new version of an > existing website that gets over 5 million page views per month. This > website will have to fit on a RaQ4i (450MHz) server, so I'm pretty > conscious about performance. Security is

Re: RFC: Security/Performance Best Practices (long)

2001-11-11 Thread Alessio Bragadini
Philip Mak: > This website runs off a MySQL database. Although all the webpages > are generated dynamically, they don't change often (unless the > webmaster explicitly updates them). Do you generate reliable Last-Modified and Expires headers? This could help bandwidth usage for you and your user

RFC: Security/Performance Best Practices (long)

2001-11-11 Thread Philip Mak
Recently, I've been using Apache::ASP to program a new version of an existing website that gets over 5 million page views per month. This website will have to fit on a RaQ4i (450MHz) server, so I'm pretty conscious about performance. Security is also important due to the popularity o

Re: modperl security model question

2001-04-17 Thread G.W. Haywood
Hi all, On Mon, 16 Apr 2001, darren chamberlain wrote: > Thomas K. Burkholder ([EMAIL PROTECTED]) said [snip] > > my $input = IO::File->new("http://perl.apache.org/guide). It can help to include the system error string (from the Perl special variable $!) in the error message which you print

Re: modperl security model question

2001-04-17 Thread Issac Goldstand
darren chamberlain wrote: > > Be sure to check that $line is defined: > Even better: > > > > use IO::File; > > my $input = IO::File->new("getline() || 'some safe default value, like ""'; > die "\$line is not defined" unless (defined $line); # <-- Now not really needed > >

Mea Culpa [Was: Re: modperl security model question]

2001-04-16 Thread Thomas K. Burkholder
It's defined all right, it gets printed to STDERR. The problem was that the file I was actually using was a perl file '/tmp/foo.pl', just because it didn't matter what was in the file while I tried to make it work. But, wait, it does matter, because the first thing in the file was "use Data::Du

Re: modperl security model question

2001-04-16 Thread darren chamberlain
Be sure to check that $line is defined: Thomas K. Burkholder ([EMAIL PROTECTED]) said something to this effect on 04/16/2001: > Note, /tmp/tmppswd is read-only by the installer of the product, but I should > be root in access.conf (right?) so I should be able to read it anyway. > > > use

Re: modperl security model question

2001-04-16 Thread Thomas K. Burkholder
t; uid & gid of the entire process. This would seem slightly better then the > below alternative as you can set MaxRequestsPerChild to 1 and just have one > parent process spawning children with different uid/gids, instead of having > to start up an entire server for each uid/gid pair...

Re: modperl security model question

2001-04-15 Thread Issac Goldstand
ve as you can set MaxRequestsPerChild to 1 and just have one parent process spawning children with different uid/gids, instead of having to start up an entire server for each uid/gid pair... Of course, there's the security problem of everything that happens in the child until it gets to the s

Re: modperl security model question

2001-04-15 Thread sterling
On Sun, 15 Apr 2001, Thomas K. Burkholder wrote: > Thanks again for the help - I have another one- > > My application consists of perl modules with file permissions set only > to a particular user 'burkhold'. The database password is kept in > plaintext in one of those modules. I use the User:

modperl security model question

2001-04-14 Thread Thomas K. Burkholder
Thanks again for the help - I have another one- My application consists of perl modules with file permissions set only to a particular user 'burkhold'. The database password is kept in plaintext in one of those modules. I use the User: and Group: directives in access.conf to cause the uid of th

bug in exploder blows up Digest security

2001-03-29 Thread Steven Lembark
anyone know of a way around this? i have a site that depends heavily on anchors for delivering reports. exploder chops off the uri at the arguments, which is not what mod_auth_digest (nor RFC 2617) expect. anyone know of a way to force exploder to use the full uri for the digest authorizati

[OT] Re: security!

2001-03-02 Thread darren chamberlain
gging, > notes/pnotes, etc. I realise a lot of this would be tricky and would > require RPC (thus opening up a security hole in its own right) but > I think it would be worthwhile. This is off-topic, pretty much, but interesting nonetheless. I just stumbled across Apache DSSI http:/

RE: security!

2001-03-02 Thread Matt Sergeant
On Thu, 1 Mar 2001, [EMAIL PROTECTED] wrote: > > I used to believe that too, but now that I've developed > > applications that make rather extensive use of the Apache API, I would > > actually love to have an environment similar to CGI but > > providing the full > > Apache API, including logging

RE: security!

2001-03-01 Thread mgraham
> > And forking a new process under mod_perl > > really defeats the purpose. > > Does it? Well I confess I just assumed. > I used to believe that too, but now that I've developed > applications that make rather extensive use of the Apache API, I would > actually love to have an environment s

(changing userids/2.0/suexec) was: RE: security!

2001-03-01 Thread Tom Brown
> > > > > This is a general Unix webserver issue and not specific to > > > mod_perl, so I've marked your message [OT] for off-topic. > > > > Well, workarounds are available for specific webserver environments, so I > > don't believe it's an inappropriate question. > > > > With CGI, you use the

RE: security!

2001-03-01 Thread Matt Sergeant
ealise a lot of this would be tricky and would require RPC (thus opening up a security hole in its own right) but I think it would be worthwhile. I certainly don't like the way we're all assuming mod_perl 2.0 is going to solve all our problems. It won't. It will just give us some fresh o

RE: security!

2001-03-01 Thread mgraham
> This is a general Unix webserver issue and not specific to > mod_perl, so I've marked your message [OT] for off-topic. Well, workarounds are available for specific webserver environments, so I don't believe it's an inappropriate question. With CGI, you use the suexec mechanism to start execu

Re: [OT] security!

2001-03-01 Thread Andrew Ho
orse. GR>May some here confirm me that if i am a security concious admin, i GR>should not make modperl+embperl available to my user? If you are a security conscious admin, and you cannot trust your users, you should not make mod_perl available to them. In fact you should not make any dynamic HTTP f

Re: security

2001-03-01 Thread Todd Finney
Stas Bekman wrote: > On Wed, 28 Feb 2001, Gustavo Vieira Goncalves Coelho Rios wrote: > > the key user\password are kept inside this file, so anyone can uses an > > editor to retrieve the user mysql account. I resolve this problem > > running php on secure mode and chgrping the php file th

Re: security!

2001-03-01 Thread clayton cottingham
Vladimir Ivaschenko wrote: > > Take a look at http://www.freevsd.org. I haven't used it personally, but > it looks like something that you need.. > This system is a based on making a chroot environment for each user with > his own apache and everything. > i can vouch for this approach to develo

Re: security!

2001-03-01 Thread Vladimir Ivaschenko
Take a look at http://www.freevsd.org. I haven't used it personally, but it looks like something that you need.. This system is a based on making a chroot environment for each user with his own apache and everything. Gustavo Vieira Goncalves Coelho Rios wrote about "security!"

security!

2001-03-01 Thread Gustavo Vieira Goncalves Coelho Rios
apped by apache suexec mechanism, is it currently done this way? Why not? May some here confirm me that if i am a security concious admin, i should not make modperl+embperl available to my user?

Re: security

2001-03-01 Thread Jimi Thompson
ags file access (g-rwx). So nobody > > besides the owner of the file (or the http process) will be able to read > > it. > > > > since php have some security facilities, like: if the file owner id != > > the file the script is trying to open => fails. > >

Re: security

2001-03-01 Thread Stas Bekman
On Thu, 1 Mar 2001, Gunther Birznieks wrote: > mod_perl 2.0 > > At 10:33 PM 2/28/2001 -1000, Kee Hinckley wrote: > >-BEGIN PGP SIGNED MESSAGE- > >Hash: SHA1 > > > >At 9:44 AM +0800 3/1/01, Stas Bekman wrote: > > >At this moment anybody who has an access to mod_perl server can read any > >

Re: security

2001-03-01 Thread Gunther Birznieks
mod_perl 2.0 At 10:33 PM 2/28/2001 -1000, Kee Hinckley wrote: >-BEGIN PGP SIGNED MESSAGE- >Hash: SHA1 > >At 9:44 AM +0800 3/1/01, Stas Bekman wrote: > >At this moment anybody who has an access to mod_perl server can read any > >data which is accessible by the same server. suexec is not an

Re: security

2001-03-01 Thread Kee Hinckley
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 At 9:44 AM +0800 3/1/01, Stas Bekman wrote: >At this moment anybody who has an access to mod_perl server can read any >data which is accessible by the same server. suexec is not an option >because of process persistance. I suspect this is why it is v

Re: security

2001-02-28 Thread Stas Bekman
s and removing other flags file access (g-rwx). So nobody > besides the owner of the file (or the http process) will be able to read > it. > > since php have some security facilities, like: if the file owner id != > the file the script is trying to open => fails. > My problem

security

2001-02-28 Thread Gustavo Vieira Goncalves Coelho Rios
php have some security facilities, like: if the file owner id != the file the script is trying to open => fails. My problem is with perl: how to solve such a problem in a perl environment? Does mod perl allows any kind of security, to prevent ones writing script to read others files? PS: All

security

2001-01-18 Thread Gustavo Vieira Goncalves Coelho Rios
Hi folks! I have just seted mod_perl with apache and i am using embperl too. I am worried about security concerns for mod_perl. How can i limit, for instance, the amount of memory used for embperl? the ammount of time allowed for a perl code to spend. With php is easy, there is directives like

RE: security suggestion

2001-01-11 Thread Doug MacEachern
On Fri, 17 Nov 2000, mgraham wrote: > Maybe another approach would be to explicitly list the handlers that > are allowed to be used in any given context. Kind of > like 'Options', but for perl handlers. Something like 'PerlOptions', > perhaps? > > > PerlOptions "My::AuthHandler My::C

Re: security suggestion

2000-11-20 Thread Dave Kaufman
han > exposing access to mod_perl from a shared web server security standpoint > especially if CGI's are suexec'ed. > > So I would advocate an ExecModPerl option or something like that so that > user's could not arbitrarily install their own Perl Handlers. >[snip] > 1

Re: security suggestion

2000-11-20 Thread Dave Kaufman
privileges he or she can commandeer the most important > part of the request cycle (the response phase), so I'm not sure we get > better > security or control by having a separate ExecModPerl option. > > NB: If we re-use ExecCGI for mod_perl, people will feel as though they'

Re: security suggestion

2000-11-20 Thread Gunther Birznieks
rl option or something like that so that > > user's could not arbitrarily install their own Perl Handlers. > >Some thoughts: > >If a user has ExecCGI privileges he or she can commandeer the most important >part of the request cycle (the response phase), so I'm not

Re: security suggestion

2000-11-20 Thread Richard L. Goerwitz
If a user has ExecCGI privileges he or she can commandeer the most important part of the request cycle (the response phase), so I'm not sure we get better security or control by having a separate ExecModPerl option. NB: If we re-use ExecCGI for mod_perl, people will feel as though they'

Re: security suggestion

2000-11-20 Thread Gunther Birznieks
In the context of what you are talking about, I think giving ExecCGI permissions should not allow them to change mod_perl handlers or do anything to adjust mod_perl either. ExecCGI is a lot less problematic than exposing access to mod_perl from a shared web server security standpoint

Re: security suggestion

2000-11-19 Thread Richard Goerwitz
on't care whether the thing that's loaded runs amok. It is my responsibility (if I allow access to a module) to make sure that module will behave itself. Those more versed in security issues will perhaps want to think this through. I've been receiving a steady trickle of off-list mail,

Re: security suggestion

2000-11-18 Thread Gunther Birznieks
I think Randal was making a similar point I was making last night (SG time). That as long as you execute Perl code, you can manipualte the memory space of Perl (and hance change the behavior of Apache::Registry). But you explained it in your reply to me. Basically you want explicit handlers th

Re: security suggestion

2000-11-17 Thread Richard L. Goerwitz
"Randal L. Schwartz" wrote: > I think y'all are missing it. As soon as I have any Perl code access > via Apache::Registry or anything like that, I can do this: > > *Apache::Registry::handler = \&my_trojan_horse; Can you explain in what server-configuration context the above directive w

Re: security suggestion

2000-11-17 Thread Randal L. Schwartz
e. So mod_perl is inherently unsafe. Either you have access to Perl, or you don't. And when you don't, you might as well invent a meta-API, like the one I suggested with Template Toolkit. You can't use the generic tools... they're too powerful. -- Randal L. Schwartz -

Re: security suggestion

2000-11-17 Thread Richard L. Goerwitz
mgraham wrote: > Maybe another approach would be to explicitly list the handlers that > are allowed to be used in any given context. Kind of > like 'Options', but for perl handlers. Something like 'PerlOptions', > perhaps? > > > PerlOptions "My::AuthHandler My::ContentHandler My::Tran

RE: security suggestion

2000-11-17 Thread mgraham
> I'd have no problem if mod_perl was set up to turn off > PerlSetEnv, lit- > eral 'sub { ... }' handlers, Perl sections, and the use of > Perl modules > in non-system paths (except where ExecCGI is turned on). Maybe another approach would be to explicitly list the handlers that are allowed to

Re: security suggestion

2000-11-17 Thread Richard L. Goerwitz
point. I'm just not familiar enough (yet) with its internals to be able to think and speak creatively about the security possibilities. -- Richard Goerwitz[EMAIL PROTECTED] - To unsubscribe, e-mail: [EMAIL PROTECTED] For additional commands, e-mail: [EMAIL PROTECTED]

Re: security suggestion

2000-11-17 Thread Randal L. Schwartz
hen they want your added functionality, all they can do is call your interfaces using the mini-Toolkit language embedded in their files. And they get a slick templating system for free! Best of both worlds. -- Randal L. Schwartz - Stonehenge Consulting Services, Inc. - +1 503 777 0095 <[EMAIL

Re: security suggestion

2000-11-17 Thread Richard L. Goerwitz
Gunther Birznieks wrote: > It seems to me that mod_perl wasn't really designed for safety against your > own developers I accept this point. But it's really beside _my_ point, which was that mod_perl modules can offer critical added functionality to run-of-the-mill web publishers (whether i

Re: security suggestion

2000-11-17 Thread Gunther Birznieks
I think these are good points. However, to some degree, if this is an attempt to allow an ISP protection, it's not because most ISPs offer CGI access to their customers. In addition, the moment you give mod_perl access to a developer they have the rights to do a LOT of stuff that goes beyond p

Re: security suggestion

2000-11-16 Thread Dave Kaufman
d. or would it? bad/uncompilable code in .htaccess would just affect the requests that invoked it, not the parent process... as long as the server is running as an unpriveledged nobody-user or SetUID as the ~/user who is owns it, the security concerns should be minimal. if a mod_perl pro

Re: security suggestion

2000-11-16 Thread Dave Kaufman
d. or would it? bad/uncompilable code in .htaccess would just affect the requests that invoked it, not the parent process... as long as the server is running as an unpriveledged nobody-user or SetUID as the ~/user who is owns it, the security concerns should be minimal. if a mod_perl pro

Re: security suggestion

2000-11-16 Thread James G Smith
Adam Prime <[EMAIL PROTECTED]> wrote: >The servers that had apache on them for users when i was at school didn't >even allow normal cgi, so i have no idea how one would approach doing >something like this with mod_perl. Even more convoluted is when a user can ExecCGI, but only via suexec. mod_p

RE: security suggestion

2000-11-16 Thread Geoffrey Young
> -Original Message- > From: Adam Prime [mailto:[EMAIL PROTECTED]] > Sent: Thursday, November 16, 2000 11:46 AM > To: '[EMAIL PROTECTED]'; [EMAIL PROTECTED] > Cc: Geoffrey Young > Subject: RE: security suggestion > > > The servers that had a

RE: security suggestion

2000-11-16 Thread Christian Gilmore
> The thing is, though, that as a web administrator I don't want those > same developers (or at least all of them) to be able to create and in- > stall _arbitrary_ handlers or arbitrary perl code. Sometimes the de- > velopers just don't know enough. And sometimes I just don't trust > them enough

RE: security suggestion

2000-11-16 Thread Adam Prime
Maybe it's just me, but it seems that the responses richard has gotten haven't really touched on the core of the problem. That mod_perl isn't exactly friendly to sysadmin's who want to run apache on a (i'm guessing), student accessed server, with user dir's and all that other stuff. I'm pretty s

Re: security suggestion

2000-11-16 Thread Richard L. Goerwitz
Geoffrey Young wrote: > maybe it would be possible to limit > > PerlAuthenHandler 'sub {do something desctructive};' > > via a directive, but this is mod_perl - I can't see how you would be able to > allow good activity without there being some way around it for destructive > types... That's w

RE: security suggestion

2000-11-16 Thread Jerrad Pierce
Perhaps you ought to gfind a way to use Safe; then? >-Original Message- >From: Richard L. Goerwitz [mailto:[EMAIL PROTECTED]] >Sent: Thursday, November 16, 2000 9:09 AM >To: mod_perl list >Subject: security suggestion > > >At Doug's suggestion I'm mov

RE: security suggestion

2000-11-16 Thread Geoffrey Young
> -Original Message- > From: Richard L. Goerwitz [mailto:[EMAIL PROTECTED]] > Sent: Thursday, November 16, 2000 10:11 AM > To: [EMAIL PROTECTED] > Cc: Geoffrey Young > Subject: Re: security suggestion > > > Following up on the security suggestion (I'm

Re: security suggestion

2000-11-16 Thread Richard L. Goerwitz
Following up on the security suggestion (I'm actually responding to private mail, so I'll just quote the person who wrote to me without giving a name) - > Of course you can do this in an .htaccess file, too: > > > arbitrary perl code... > I'd argue that peopl

security suggestion

2000-11-16 Thread Richard L. Goerwitz
At Doug's suggestion I'm moving a brief conversation we've had in private to this list so others can get involved. I've been following out the security implications of mod_perl here at Brown University, and from what I can see, enabling it gives people the same basic ac

Re: security suggestion

2000-10-18 Thread Richard L. Goerwitz
Would it make sense to allow anonymous subroutines as handlers only if ExecCGI is turned on for a given directory? (Likewise, allow handlers only in modules residing in system directories unless ExecCGI is turned on?) -- Richard Goerwitz[EMAIL PROTECTED]

Re: Security of PerlHandler directives

2000-09-19 Thread Matt Sergeant
On Tue, 19 Sep 2000, Richard Goerwitz wrote: > I can certainly understand why someone would want to keep Registry > or Embperl-enabled scripts in directories reserved for trusted sys- > tems people. > > But it shouldn't be a tremendously big deal to allow people to use > pre-written modules usin

Security of PerlHandler directives

2000-09-19 Thread Richard Goerwitz
I can certainly understand why someone would want to keep Registry or Embperl-enabled scripts in directories reserved for trusted sys- tems people. But it shouldn't be a tremendously big deal to allow people to use pre-written modules using directives like 'PerlHandler', right? Trouble is that p

Re: mod_perl security :: possible solution

2000-09-08 Thread Stas Bekman
the best? > I am open for any comments and help... I plan to set up some package or at > least a web page to explain to others how to do it once it is working > perfectly for me. I noticed that perl security (along with shell security) > is one of the worst seucirty/privacy treat in almo

mod_perl security :: possible solution

2000-09-07 Thread Félix C.Courtemanche
e. I noticed that perl security (along with shell security) is one of the worst seucirty/privacy treat in almost all web hosting companies... and I intend to solve this. :) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Félix C.Courtemanche . Head Designer Co-Administrator . Can-Host Net

Re: mod_perl security on a shared web server

2000-09-07 Thread Stas Bekman
ull for me and others. > > Please don't tell me to monitor the user's scripts, since that is almost > impossible to do when you have more than 10 sites to monitor, wich will > happen quickly :) > > Any other tips and tricks to improve the security of mod_perl

RE: mod_perl security on a shared web server

2000-09-06 Thread Christian Gilmore
Felix, There's not much available that is efficient and does per-resource throttling based upon CPU, RAM, and time of which I know. I looked around for such things about 8 months ago. I instead decided that, for my needs, limiting simultaneous client access to resource hogs was good enough. I wr

Re: mod_perl security on a shared web server

2000-09-06 Thread Félix C.Courtemanche
at is completed and working well. Please keep in mind that security and optimization are the top 2 priorities in this adventure :) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Félix C.Courtemanche . Head Designer Co-Administrator . Can-Host Networks http://www.can-host.com [

Re: mod_perl security on a shared web server

2000-09-05 Thread Jonathan Leto
gather the tools to make it as effective as possible, it would be really > usefull for me and others. > > Please don't tell me to monitor the user's scripts, since that is almost > impossible to do when you have more than 10 sites to mo

Re: mod_perl security on a shared web server

2000-09-05 Thread Matt Sergeant
On Wed, 6 Sep 2000, Félix C.Courtemanche wrote: > Hello, > > I couldn't find any occurance of this question in the archives, but if it > does exists, please forward me to it. > > I have been working on a set of Administration Tools for commercial web > hosting companies for quite some times. L

mod_perl security on a shared web server

2000-09-05 Thread Félix C.Courtemanche
s to make it as effective as possible, it would be really usefull for me and others. Please don't tell me to monitor the user's scripts, since that is almost impossible to do when you have more than 10 sites to monitor, wich will happen quickly :) Any other tips and tricks to improve th

Re: .htacess security

2000-08-15 Thread Doug MacEachern
On Thu, 3 Aug 2000, Rob Giseburt wrote: > Are .htaccess files secure? I don't want users to be able to use > ... sections or any other mod_perl constructs (setting scripts > to run via the Registry, for example) in .htaccess files. However, I need > .htaccess files turned on so users can passwo

Re: .htacess security

2000-08-04 Thread Dan Rench
On Thu, 3 Aug 2000, Ken Williams wrote: > [EMAIL PROTECTED] (Rob Giseburt) wrote: > >Are .htaccess files secure? I don't want users to be able to use > >... sections or any other mod_perl constructs (setting scripts > >to run via the Registry, for example) in .htaccess files. However, I need >

Re: .htacess security

2000-08-03 Thread Ken Williams
[EMAIL PROTECTED] (Rob Giseburt) wrote: >Are .htaccess files secure? I don't want users to be able to use >... sections or any other mod_perl constructs (setting scripts >to run via the Registry, for example) in .htaccess files. However, I need >..htaccess files turned on so users can password p

Re: .htacess security

2000-08-03 Thread Rob Giseburt
On 8/3/2000 9:54 AM, Erich L. Markert at [EMAIL PROTECTED] wrote: > Damn good question... > > I know the default apache config has a rule that prevents .htaccess > files from being accessed via a URL but not from within an embedded. > > One way around this would be to use a database to handle a

  1   2   >