[257] in WWW Security List Archive

home help back first fref pref prev next nref lref last post

Re: Secure W3 Server

daemon@ATHENA.MIT.EDU (smb@research.att.com)
Tue Dec 13 17:05:35 1994

From: smb@research.att.com
To: David Miller <isdmill@gatekeeper.ddp.state.me.us>
cc: hharamis@cohesive.com, www-security@ns1.rutgers.edu
Date: Tue, 13 Dec 94 12:35:36 EST
Reply-To: smb@research.att.com

	 I don't doubt that the httpd servers have bugs which can be
	 exploited in some fashion.  However, I would expect the damage
	 to be more localized to the www server system, not the entire
	 system.  Sendmail needs to run suid root to do all the
	 whiz-bang stuff its famous for, and that means that once you
	 find a bug you have root priviledges.  Httpd servers run very
	 nicely as user httpd so the damage can be more easily
	 contained.

The big weakness of sendmail -- against outside attack -- has nothing
to do with its root privileges.  Rather, the problem is that it grants
access at all.  Your first line of defense is keeping someone off the
machine entirely; anything that lets someone in at all is an extremely
serious matter.

httpd is a risk partly because it's complex, but also because some of
the interesting things you can do with it involve perl or sh scripts
interpreting user inputs.  It's some help that you can run httpd in a
chroot'ed area, but that's not a panacea.  chroot is wonderful as
a restriction on file access; it is not suitable if the enemy can
execute arbitrary programs in the chroot'ed area.


		--Steve Bellovin

home help back first fref pref prev next nref lref last post