[Wolves] Couple of Konqueror q's
Wayne Morris
wayne at machx.co.uk
Fri Feb 6 02:27:06 GMT 2004
>
> Indeed. To further clarify, the web server software should be running as a
> non-root user (which is typically called "httpd", "apache", "web", or some
> similar variation). Most modern distros ought to set the web server up like
> this by default anyway, but if you use Apache you can type
>
> ps aux | grep httpd
>
The results of this are:
root 796 0.0 0.0 16988 88 ? S Feb04 0:00
/usr/sbin/httpd
apache 855 0.0 0.8 18368 2000 ? S Feb04 0:01
/usr/sbin/httpd
apache 856 0.0 0.5 18384 1216 ? S Feb04 0:00
/usr/sbin/httpd
apache 857 0.0 0.5 18540 1252 ? S Feb04 0:00
/usr/sbin/httpd
apache 858 0.0 0.3 18680 808 ? S Feb04 0:00
/usr/sbin/httpd
apache 859 0.0 0.4 18360 1080 ? S Feb04 0:00
/usr/sbin/httpd
apache 860 0.0 0.4 18632 1088 ? S Feb04 0:00
/usr/sbin/httpd
apache 861 0.0 0.4 18520 1080 ? S Feb04 0:00
/usr/sbin/httpd
apache 862 0.0 0.7 18648 1772 ? S Feb04 0:01
/usr/sbin/httpd
apache 2493 0.0 0.3 18320 696 ? S Feb04 0:00
/usr/sbin/httpd
with nobody logged in on webserver, this from ssh'ing from another box.
As you see , one root, rest apache - good or bad?
> to see which user name is being used. (Shown in the left-hand column)
>
> In order to make it more difficult for crackers to place malicious files on
> the server and subsequently execute them, the user the web server runs under
> should *NOT* have write access to any file or directory that the web server
> is serving out, or to any other files (with the possible exception of /tmp
> and /var/tmp) without having a specific/genuine reason. A similar policy
> should be adopted for other services wherever possible.
>
So apache should not have write access to the web directory, but should
be 'owner'and have read access?
> For similar reasons damage limitation reasons, it's best to work as a
> non-privilaged user rather than "root" wherever possible. If your web server
> was running under user name "apache" and you logged in as "wayne" to maintain
> the site(s) on it, the files that make up the web sites would/should have
> owner "wayne", group "apache", with read-only access given to the group and
> no access to world.
Hmm, have to look at that, mine are prolly wrong!
>
> To further improve security, you could also
> - investigate which add-on modules such as mod_perl, mod_php, etc are running
> and disable any that aren't needed.
> - run the web server in a chroot environment.
> - uninstall any other software which isn't strictly necessary to the running
> of the server
>
>
> _______________________________________________
> Wolves LUG mailing list
> Homepage: http://www.wolveslug.org.uk/
> Mailing list: Wolves at mailman.lug.org.uk
> Mailing list home: http://mailman.lug.org.uk/mailman/listinfo/wolves
Wayne Morris
07960 859346
--
Live machinery database
www.machx.co.uk/classifieds/
Most recently added items
www.machx.co.uk/classified/recent.php
More information about the Wolves
mailing list