Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 12 Nov 2002 21:32:26 -0700
From:      James Pye <jwp@rhid.com>
To:        FreeBSD ISP List <freebsd-isp@freebsd.org>
Subject:   Re: per-user groups
Message-ID:  <20021113043225.GA83041@void>
In-Reply-To: <20021112201947.GA28569@users.munk.nu>
References:  <20021105130922.A36056@cthulu.compt.com> <20021110214410.GA98103@users.munk.nu> <20021112085654.GA55722@blazingdot.com> <20021112201947.GA28569@users.munk.nu>

next in thread | previous in thread | raw e-mail | index | archive | help

--qDbXVdCdHGoSgWSk
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

greetings,

	suEXEC wrapper seems to solve the problem about running CGI scripts as the=
 www user.  you can use the User and Group directives inside <VirtualHost> =
with the suEXEC wrapper enabled.
	tho, wouldn't it be useful to spawn httpd processes serving a virtualhost'=
s pages as the User and Group specified within <VirtualHost>? suEXEC appare=
ntly only affects cgi scripts.. perhaps i am missing something tho...(this =
would solve the problem without placing the www user in the user's group)
	of course, there are security considerations involved with using suEXEC...

	http://httpd.apache.org/docs/suexec.html

-james

On 11/12/02:45/2, Jez Hancock wrote:
> Date: Tue, 12 Nov 2002 20:19:47 +0000
> From: Jez Hancock <jez.hancock@munk.nu>
> To: FreeBSD ISP List <freebsd-isp@freebsd.org>
> Subject: Re: per-user groups
>=20
> On Tue, Nov 12, 2002 at 12:56:54AM -0800, Marcus Reid wrote:
> > Another way to do almost the same thing is to have the users home
> > directory perms set to rwxr-x--x. Apache can get to the users public_ht=
ml
> > directory, and noone can get a directory listing of another persons home
> > directory. Users still have to make sure that files they don't want to
> > be world readable aren't world readable, but it's a solution that suits
> > my tastes a little better.
> This is how I had my system setup until a few days ago, the nice thing ab=
out
> it being if one user in a shell wants to let another user look at a file =
they
> can just say 'have a look at /home/myhome/file' and providing the perms on
> 'file' are right, the other user can still see the file even though they
> can't actually run a listing on the directory /home/myhome.
>=20
> Obviously though this runs the risk of letting user's guess the location =
of
> important files in a shell (which was why I moved away from this setup) -=
 say by
> attempting to read commonly used names for config files, ie:
>=20
> 'cat /home/another/web/include/config.php'
>=20
> Regarding what you say about user's being able to use the fact the 'www' =
user is
> in all user groups to write malicious scripts to read / traverse director=
ies outside
> their own home dir - I know you can setup PHP to stop this (using the ope=
n_basedir
> and safe_mode php.ini settings for example), but how do you do similar fo=
r cgis?
>=20
> Incidentally I'm having hassles getting that setup I suggested to work, i=
t's totally
> baffling.  I'm sticking with the method you mention Marcus for now ;)
>=20
> Regards,
>=20
> Jez
>=20
> To Unsubscribe: send mail to majordomo@FreeBSD.org
> with "unsubscribe freebsd-isp" in the body of the message

--qDbXVdCdHGoSgWSk
Content-Type: application/pgp-signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (FreeBSD)

iD8DBQE90dXZnbjJW1rXbm8RAuDgAJ4uxKfTqF60RCrxjI5KRk2wTkxKqQCgoN1O
7XPuvCttMP55h4HxP6lMF3M=
=nL1L
-----END PGP SIGNATURE-----

--qDbXVdCdHGoSgWSk--

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-isp" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20021113043225.GA83041>