slive 01/10/05 14:23:46
Modified: htdocs/manual/misc security_tips.html
Log:
Some more detail about SSI security.
With some changes by Chris Pepper, Cliff Woolley, and Joshua Slive.
Submitted by: Allan Liska <[EMAIL PROTECTED]>
Revision Changes Path
1.26 +42 -8 httpd-docs-1.3/htdocs/manual/misc/security_tips.html
Index: security_tips.html
===================================================================
RCS file: /home/cvs/httpd-docs-1.3/htdocs/manual/misc/security_tips.html,v
retrieving revision 1.25
retrieving revision 1.26
diff -u -d -b -u -r1.25 -r1.26
--- security_tips.html 2001/10/02 15:40:07 1.25
+++ security_tips.html 2001/10/05 21:23:46 1.26
@@ -95,15 +95,49 @@
<h2><a id="ssi" name="ssi">Server Side Includes</a></h2>
- <p>Server side includes (SSI) can be configured so that users
- can execute arbitrary programs on the server. That thought
- alone should send a shiver down the spine of any sys-admin.</p>
+ <p>Server Side Includes (SSI) present a server administrator with
+ several potential security risks.</p>
- <p>One solution is to disable that part of SSI. To do that you
- use the IncludesNOEXEC option to the <a
- href="../mod/core.html#options">Options</a> directive.</p>
+ <p>
+ The first risk is the increased load on the server. All SSI-enabled
+ files have to be parsed by Apache, whether or not there are any SSI
+ directives included within the files. While this load increase is
+ minor, in a shared server environment it can become significant.</p>
- <p></p>
+ <p>
+ SSI files also pose the same risks that are associated with CGI
+ scripts in general. Using the "exec cmd" element, SSI-enabled
+ files can execute any CGI script or program under the permissions
+ of the user and group Apache runs as, as configured in httpd.conf.
+ That should definitely give server administrators pause.</p>
+
+ <p>
+ There are ways to enhance the security of SSI files while still taking
+ advantage of the benefits they provide.</p>
+
+ <p>To isolate the damage a wayward SSI file can cause, a server
+ administrator can enable <a href="../docs/suexec.html"
+ >suexec</a> as described in the <a href="#cgi">CGI in General</a>
+ section.</p>
+
+ <p>
+ Enabling SSI for files with .html or .htm extensions can be
+ dangerous. This is especially true in a shared, or high traffic,
+ server environment. SSI-enabled files should have a separate
+ extension, such as the conventional .shtml. This helps keep
+ server load at a minimum and allows for easier management of
+ risk.</p>
+
+
+ <p>Another solution is to disable the ability to run scripts and
+ programs from SSI pages. To do this replace <code>Includes</code>
+ with <code>IncludesNOEXEC</code> in the <a
+ href="../mod/core.html#options">Options</a> directive. Note that
+ users may still use <--#include virtual="..." --> to execute
+ CGI scripts if these scripts are in directories desginated by a <a
+ href="../mod/mod_alias.html#ScriptAlias">ScriptAlias</a>
+ directive.</p>
+
<hr />
<h2><a id="nsaliasedcgi" name="nsaliasedcgi">Non Script Aliased
---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]