mouss wrote:
Johnny Hughes wrote:
Simon Jolle wrote:
2008/2/11, James A. Peltier <[EMAIL PROTECTED]>:
This is a very broad question to ask, however, I will appeal to the basics.

1) Use HTTPS whenever possible to avoid any passwords crossing the wire
in clear text.

2) Ensure only the necessary modules are installed or enabled for your
CMS to operate.

3) Always think least permissions necessary to perform the task

4) Ensure that MySQL is locked down with least permissions necessary.
At the very least after you've installed MySQL make sure to run the
secure-mysql-installation script to assign a password to the MySQL root
user and lock down some of the basic tables.

Each system is different and you should follow the guidelines outlined
by the CMS to properly secure.  If you are not sure of what you are
deploying, that's kinda scary, you should be weary of that and tread
lightly.

thank you

I will deploy Wikka Wiki [0] - there are no explicit security settings
or guidelines

How to harden Apache and PHP (without using SELinux)?

SELinux is the "best" hardening step available for securing RH based php/httpd/mysql stacks (IMHO) ... why are you taking it off the table ???

Let me try:

- because it's too much? complexity is the ennemy of security. lack of adequate documentation is the ennemy of usability. I couldn't find simple directions on how to make a service work correctly in presence of selinux (except disabling it).
---------
# Activate auditd
chkconfig auditd on && /etc/init.d/auditd start

# Start apache and do your stuff to generate messages in audit.log

restorecon -R /var/www/
audit2allow -M rule-name < /var/log/audit/audit.log
semodule -i rule-name.pp
---------

You should read (and maybe modify) the file "rule-name.te" before the semodule's command which is created by the audit2allow's one. It is not really the correct way to do as it is likely going to open too much stuff. It's just to show you that you can live with selinux enabled.
Think that selinux can make you save time.

Regards,
kfx


all docs I've seen place the discussion in a meta-world and require spending time understanding terminology and concepts that I am not sure to find useful.

- because it doesn't secure apache/php. it secures the system against apache (to some extenst) but doesn't help securing apache itself.



besides SELinux, you might want to look at php-suhosin:

http://www.hughesjr.com/content/view/21/1/

It would be nice if RH included this by default...
_______________________________________________
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos

_______________________________________________
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos

Reply via email to