On Mon, Sep 06, 2004 at 01:32:19PM -0500, Matthew Boehm wrote:
> thats about the most unsecure thing I've ever seen.  there is a reason you
> don't run apache as root and therefore having a script that sudo's is just
> as bad.
> 
> try using the manager interface for better security.  * shouldn't be running
> as root either if we want to get nitty-gritty about security.

Not exactly. sudo allows you a more fine-grained control than simply
running apache as root. In what I suggested (and I hope that this is
what the original sender meant) apache is only allowed to query the
asterisk process for the version. Any other command-line is rejected. I
can't see any problem with that, except a possible DoS attack. But that
DoS attack will probably be available with any other alternative method.

-- 
Tzafrir Cohen                       +---------------------------+
http://www.technion.ac.il/~tzafrir/ |vim is a mutt's best friend|
mailto:[EMAIL PROTECTED]       +---------------------------+
_______________________________________________
Asterisk-Users mailing list
[EMAIL PROTECTED]
http://lists.digium.com/mailman/listinfo/asterisk-users
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users

Reply via email to