On Wed, 2004-01-14 at 13:32, Chris W wrote:
> Are there many php or mysql configuration considerations for making the 
> site secure?  I have already done the obvious with my sql and set up the 
> grant tables with passwords for all users and removed the [EMAIL PROTECTED] user.

Give the MySQL user you're using only the minimum permissions.  I doubt
your web app will need to ALTER table structures for example.

I like to use privilege separation.  In my code I have different MySQL
users with different permission.  One might have read-write access
(SELECT, INSERT, UPDATE etc.) and another has read-only.  I then use
these users appropriately throughout my code.  For example, a script
that searches a table uses the read-only user.  Then no matter how
clever the attacker is, they won't be able to DELETE all my data by
exploiting that code.

John.
-- 
GPG: B89C D450 5B2C 74D8 58FB  A360 9B06 B5C2 26F0 3047
URL: http://www.johnleach.co.uk

Attachment: signature.asc
Description: This is a digitally signed message part

Reply via email to