Phishing - Linux boxes are vulnerable

Res res at ausics.net
Thu Oct 4 22:48:25 UTC 2007


On Thu, 4 Oct 2007, Ben Mohilef wrote:

> After setting up a secure Apache (irrespective of the distribution) a lot of
> admins go get a "php-this" or "php-that" web program from a repository.
> Unfortunately, they don't ask the question of how this thing will be
> automagically updated each time a vulnerability is fixed, so the program
> never gets updated.

So so so correct...some basic policies would be to...

1. always run hosts with own user and apache group, set up vhost dirs
    permissions accordingly for this
2. always use suexec
3. if possible run php as a cgi
4. lock down php for example:
- open_basedir =/var/www:/var/tmp:/tmp:/usr/local/lib/php
- disable_functions = exec, shell_exec, system, virtual, show_source,
   readfile, passthru, escapeshellcmd, popen, pclose, phpinfo
- disable safe_mode

4a. (if tehy say their scripts need access to bin like for uptime etc tell
     em to get a better script)
4b. (make absolutely NO exemptions to the lockdowns)

5. never install vhost sites special programs that need root in any way
    shape or form

6. use a respected server OS, one that doesnt hack the f#ck out of
   programs like RH(CentOS) do

6a. use modern current packages of apache2, php5 and MySQL,Sendmail etc
     from the respective sites, and not by use of RPM's because its too
     "vendor altered" which is where 90% of the security issues come into
     it.

7. ban use of any but most current version of phpnuke (ban totally if you
    can) and those frickin image gallery programs.

8. use a decent detection system

9. use something like MailScanner with spamassassin adn a good anti-virus
    on your mail server to minimise the exploit opening in the first place

10, follow same rules as you would on winblow$, no running stuff you dont
     know what it is, no clicking on links in mesgs you dont know the 
sender, its all basic sence :)



-- 

Cheers
Res

Slackware -V- sloooUbuntoooou
http://lxer.com/module/newswire/view/93393/




More information about the fedora-list mailing list