On 10/20/2011 5:10 PM, Chris Snyder wrote:
It would be more interesting to find out that these attacks are happening in VPSes or private servers, which would indicated a real exploit, rather than on GoDaddy or Dreamhost or some other shared system.
I find there are 3 classifications of attacks to be concerned about, and each is problematic to address.
One is known PHP exploits. The problem with known PHP exploits is that there are a number of ways to secure a system against them, but quite often PHP programmers have this idealized view that basically shifts the responsibility for security to the underlying operating system. There are quite a number of exploits based on writing or appending to an existing file where if the file was read only, even if still owned by the web server process and able to chmod it at will from within PHP, those exploits would be stopped cold. Coders are lazy though and they claim "well, if you can WRITE to the file, then you can change the file permissions, so why should I do extra work whenever I want to write a file".
The next is based on shared hosts and leaving files writable to other virtual hosts running on the system, so one compromise allows all to be compromised. Instead of taking steps to minimize that, the solution proposed seems to be run your own VPS.
Yet the VPS has it's own problem in that most of them don't bother to lock out users who repeatedly try to ftp/sftp to the system - thereby being open to dictionary attacks.
The solution is to take security seriously and actually attempt to plug as many holes as possible, never just declare it as someone else's problem and that "all will be better if only you do..."
Just MHO -Gary _______________________________________________ New York PHP Users Group Community Talk Mailing List http://lists.nyphp.org/mailman/listinfo/talk http://www.nyphp.org/Show-Participation